Latest News
Logpoint announces new Partner Programs to drive growth for MSSPs and Channel Partners
The Logpoint Managed Security Service Provider (MSSP) program enables MSSPs to use Logpoint solutions in a more simple and flexible manner. The Logpoint Channel Partner Program empowers partners with a simplified tiering structure and greater rewards for Deal Registration, which...
Logpoint and IT-TOTAL partner to safeguard small and medium-sized organizations in Sweden
The Swedish Managed Security Services provider IT-TOTAL partners with Logpoint to offer a Security Operations Center (SOC) solution to small...
Logpoint appoints industry veteran Sean Muirhead as Chief Product Officer
Experienced cybersecurity executive Sean Muirhead joins Logpoint to ensure the company builds security products that fit the challenges customers and...
Logpoint releases new capabilities to optimize cybersecurity performance
Logpoint enhances its Converged SIEM platform to help organizations and MSSPs improve cybersecurity performance and free up time and resources...
Logpoint and SecurValue partner to secure organizations in Southern Europe
The Managed Service Provider SecurValue partners with Logpoint to help organizations manage risk and mitigate cyber threats in the South...
Logpoint boosts BCS solution with cloud security capabilities
Logpoint’s new BCS for SAP BTB offers cloud security capabilities to help organizations manage monitoring and threat detection in SAP...
Cactus: Defending against a ransomware newcomer
Cactus emerged in March this year and has since built an extensive portfolio of high-profile victims. Logpoint has analyzed Tactics,...
Logpoint completes SOC 2 Type II audit
Logpoint fortifies commitment to protect customers' data with new SOC 2 Type II attestation. COPENHAGEN, November 21, 2023 – Logpoint...
Logpoint enhances BCS solution with automation capabilities to simplify patching SAP systems
Logpoint’s new Vulnerability Monitoring Analyzer helps organizations automate and simplify vulnerability management in SAP systems.Organizations can get a complete overview...
Cozy Bear: Unmasking the decades-long espionage arsenal
The infamous state-sponsored Advanced Persistent Threat (APT) linked to Russia remains active, posing a severe threat to organizations. Logpoint has...
Akira: A new ransomware gang wreaks havoc
Emerging in March this year, Akira quickly joined the most active ransomware groups as number four. Logpoint has analyzed the...
Logpoint and METCLOUD partner to advance capability to combat the exponential threat of cybercrime across the UK
Partnership will enable organisations to detect and respond to threats across the entire technology landscape faster.COPENHAGEN & LONDON, September 19,...
Logpoint releases enhanced automation, investigation, and incident response capabilities
Logpoint releases various updates to its Converged SIEM platform to help SOC teams operate with practical SOC-centered functions and improved...
Logpoint in the Media
Finance Derivative • April 12, 2024
Systemic Cyber Risk: How the finance sector can bolster detection and response
Infopoint Security • April 11, 2024
Logpoint kommentiert XZ Utils Sicherheitslücke in der Software-Supply-Chain
VentureBeat • April 2, 2024
Defending against IoT ransomware attacks in a zero-trust world
IT-Daily • April 2, 2024
Raspberry Robin: Vorsicht vor Malware-Bedrohung mit Wurm-Fähigkeiten
Innovation News • March 26, 2024
Why the midmarket is eyeing Managed Detection and Response
Professional Security Magazine • March 25, 2024
Changing role of CISO
Comms Business • March 25, 2024
The RFP gap
SecurityBrief UK • March 15, 2024
The convergence of endpoint security & automated investigation & response
Contacts
Logpoint Blog - Get Updated
Beginners guide to SAP Security: Why is it important and how does it work?
Organizations widely use SAP systems to perform daily operations throughout almost every step of the value chain. Aside from being...
Read moreXZ Utils Backdoor: Supply Chain Vulnerability (CVE-2024-3094)
Introduction XZ Utils is a set of open-source compression utilities for compressing and decompressing files using the LZMA compression algorithm,...
Read moreRaspberry Robin, Not a Juicy Raspberry You Love
Fast facts Raspberry Robin, previously disseminated through USB drives, now employs Discord for distribution. The utilization of Raspberry Robin has...
Read more