5 ways MSSPs can transform daunting challenges into opportunities
Managed Security Service Providers (MSSPs) play an increasingly critical role in cybersecurity as more and more organizations turn to them for cybersecurity assistance. As threat actors continue to develop techniques and tactics, compliance requirements multiply, and the complexity of cybersecurity infrastructure increases, organizations scramble to protect business assets and processes from inter
Du kan ende som ufrivillig aktør i cyberkrigen
Undervurderer virksomheder nødvendigheden af it-sikkerhed, kan de ende som ufrivillig aktør i den voksende cyberkrig
Cybersecurity protection is a corporate social responsibility – especially during times of war
Failing to protect your organization against cyberattacks does not only endanger your enterprise – it also puts your business partners and broader society at risk, especially during times of war like the ongoing war in Europe
LogPoint 2022 Predictions: The year of holistic threat detection and incident response
LogPoint CTO Christin Have predicts that 2022 will be the year if holistic threat detection and incident response.
The most Cybersecurity-vulnerable nations in the EU
hile Denmark tops the list as the most digitized economy and society in the EU, the country is less committed to cybersecurity. This combination makes Denmark the most cybersecurity-vulnerable country in the EU.
Uansvarlig tilgang til cybersikkerhed ødelægger virksomheder
Mangel på cybersikkerhed er en af de mest kritiske trusler mod virksomheder i dag. Den sidste måned har budt på en lang række højtprofilerede angreb mod danske virksomheder, som illustrerer, hvor stor betydning angreb kan have for virksomheders forretning.
Tackling Log4Shell requires a defence-in-depth strategy
The Log4Shell vulnerability is serious – it’s difficult to detect, used in lots and lots of software, and is the perfect vehicle to get malware into your network. There’s no one cyber tool that can protect your enterprise against Log4Shell. A combination of tools and a defense-in-depth mindset will give organizations the ability to detect post-compromise activity and stop the attack.
A shift from detection to holistic response
The capabilities of SOAR are driving the shift from security analytics to security operations at LogPoint. In this blogpost, LogPoint CTO Christian Have details the path from detection to holistic response.
Fighting the ransomware war
By LogPoint CTO Christian Have
Ransomware attacks are becoming increasingly devastating to companies. Not only do they inflict massive disruptions to operations, but criminals are also asking for ever-larger ransoms to unlock the encrypted files and machines hit by the attacks.
Throughout the last months, state-sponsored ransomware attacks inflicting damage on critical infrastructure have d