Skip to content

News archive

There’s no one cyber tool that can protect your enterprise against Log4Shell. A combination of tools and a defense-in-depth mindset will give organizations the ability to detect post-compromise activity and stop the attack.

Tackling Log4Shell requires a defence-in-depth strategy

The Log4Shell vulnerability is serious – it’s difficult to detect, used in lots and lots of software, and is the perfect vehicle to get malware into your network. There’s no one cyber tool that can protect your enterprise against Log4Shell. A combination of tools and a defense-in-depth mindset will give organizations the ability to detect post-compromise activity and stop the attack.

The capabilities of SOAR are driving the shift from security analytics to security operations at LogPoint

A shift from detection to holistic response

The capabilities of SOAR are driving the shift from security analytics to security operations at LogPoint. In this blogpost, LogPoint CTO Christian Have details the path from detection to holistic response.

LogPoint partners with leading Japanese network security provider Jupiter Technology, to provide foundational cybersecurity technology to customers in Japan.

LogPoint names Jupiter Technology its first certified partner in Japan

LogPoint partners with leading Japanese network security provider, to provide foundational cybersecurity technology to customers in Japan. In-troducing automation, increased speed and precision in incident response, bringing SOAR to organizations of all sizes.

Show more