
SIEM vs Log Management System – Key Differences
February 2, 2023, Data Security
People sometimes ask the question, “What’s the difference between SIEM and Log Management?”, usually because… Read More

IT Compliance Audit Checklist
January 4, 2023, Compliance
Although each compliance standard has its own specifications, many of the rules overlap. For instance,… Read More

How to Detect Privileged Account Abuse
December 2, 2022, Data Security
Over the last decade organizations have been waking up to the fact that most security… Read More

How Hackers Can Bypass Multi-Factor Authentication
November 10, 2022, Data Security
Multi-factor authentication (MFA) is an authentication protocol that asks users for additional factors in order… Read More