How to perform Log Analysis ?
Discover the power of log analytics : Streamlined Troubleshooting, Strengthened Security Monitoring, Optimized Performance and make Data-Driven...
Discover the power of log analytics : Streamlined Troubleshooting, Strengthened Security Monitoring, Optimized Performance and make Data-Driven...
On the important of OT monitoring in physical industries, key challenges, emerging trends and best practices to ensure robust security, resilience...
Discover the ISO 27001 new controls, they are 11, and have been implemented in October 2022. Implement these 11 new controls before your next audit !
Detailed explanation about the latest changes about ISO-27001-2022 controls : 11 new controls, 4 categories instead of 14 and introduction of 5...
A complete guide about OT Automation. Discover how IT/OT convergence helps development and how disruptive tool make OT automation effortless.
Understand what is a cybersecurity playbook, what are the differents functions of it and what are the differents types of playbooks. Read Now !
Learn about the Four-Step Security Incident Response Process and detect, analyze, contain, and eradicate security incidents.
This November, we decided to open source one of our internal libraries to the world: the driver we use for data persistence.
Control 8.15 - Logs that record activities, exceptions, faults and other relevant events should be produced, stored, protected and analysed