• QRadar or the price of not investing on a truly consolidated platform

    In the quest of increasing their security posture, organizations tend to think that security operations [...]

  • On Demand: Maximizing SOC Efficiency with ChatGPT: Harnessing the Power of Large Language Models

    Large Language Models like OpenAI’s ChatGPT are generating a lot of buzz lately. Logpoint’s customers [...]

  • On Demand: Vice Society’s Double Extortion – Demanding Ransom and Threatening Data Leaks

    Vice Society is making headlines since its initiation after making continuous high-profile targeted attacks on [...]

  • Ease of work in an end-to-end cybersecurity platform 

    Ensuring your organization is secure, and stays that way, is not an easy job. There [...]

  • On Demand: Overcoming the compliance challenges with BCS for SuccessFactors

    Even though SAP SuccessFactors contains some of the organization’s most sensitive and regulated data, it [...]

  • MOVEit’s Zero Day: The File Transfer Turmoil

    Executive SummaryMultiple vulnerabilities in MOVEit Transfer tracked as CVE-2023-34362, CVE-2023-35036, and CVE-2023-35708 were found.Mentioned vulnerabilities are [...]

  • SOX Cybersecurity Compliance – What is it?

    SOX or The Sarbanes-Oxley Act (SOX) was passed in 2002 in the USA and requires [...]

  • What is SIEM? The Ultimate Guide to Security Information and Event Management

    Data protection and cyber threat detection are crucial for businesses in today's landscape. Security Information [...]

  • Uncoiling the Enigma of Russian Intelligence’s “Snake Malware”

    You could be forgiven for thinking it's the month of snake, as the Russian Intelligence’s [...]

  • Emerging Threat: Vice Society’s Double Extortion Strategy

    Executive Summary Vice Society is a relatively new Russian-speaking hacking group that arose in the [...]

  • Introducing JSON Parser: Master your JSON data-types

    With the advent of cloud and container technologies, businesses and organizations are adopting them at [...]

  • BCS for SAP: Enhanced security monitoring and threat detection

    Securing your SAP systems and applications is one of our top priorities. We want you [...]