Blog

Our next-gen SIEM & smart SOAR illustrate our expertise. So do the blog. Through our blog posts, deepen your knowledge on various SecOps topics or get updated about important news & modern approaches for cybersecurity. Get into the habit of reading valuable information provided by Logsign. Be a step ahead.

Find the Correct MSSP or Build an Efficient SOC?

16.09.2020

Find the Correct MSSP or Build an Efficient SOC? (Part 1)

Today, to deal with ever-growing, fast, and sophisticated cybersecurity threats and attacks, enterprises either find the correct MSSP (Managed Security Service Provider) or build an efficient SOC (Security Operation Center). In either case, the role of Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) are indispensable.

Learn more
How to Customize a Dashboard on Logsign SIEM?

14.09.2020

How to Customize a Dashboard on Logsign SIEM?

In this article, we explore how you can customize a dashboard, add widgets, manage dashboard categories, arrange dashboards and categories, and much more.

Learn more
4 Step Guide to Stronger OT Security

11.09.2020

4 Step Guide to Stronger OT Security

OT security is the practice of using hardware and software technologies to monitor, detect, and control changes to processes, events, and devices.

Learn more
How Cyber Kill Chain Can Be Useful for a SOC Team?

09.09.2020

How Cyber Kill Chain Can Be Useful for a SOC Team? (Part 2)

This article explains the last four stages of Cyber Kill Chain that includes Installation, Command and Control (C2), Actions on Objectives, and Exfitration.

Learn more
How to Create & Customize Correlation Rules on Logsign SIEM

07.09.2020

How to Create & Customize Correlation Rules on Logsign SIEM

This article guides you through the process of creating correlation rules on Logsign SIEM.

Learn more
What are The Types of Dashboards in a SIEM Solution?

04.09.2020

What are The Types of Dashboards in a SIEM Solution?

This article thoroughly covers the types of dashboards available on a SIEM solution, along with data contained therein.

Learn more
How to Customize a Report on Logsign SIEM?

02.09.2020

How to Customize a Report on Logsign SIEM?

In this article, we explore how you can customize an existing report on Logsign SIEM to suit your requirements.

Learn more
What are the Types of Reports on a SIEM Solution?

31.08.2020

What are the Types of Reports on a SIEM Solution?

In this article, we look at various types of reports available on a SIEM solution such as Logsign.

Learn more
How Cyber Kill Chain Can Be Useful for a SOC Team?

28.08.2020

How Cyber Kill Chain Can Be Useful for a SOC Team? (Part 1)

A Cyber Kill Chain defines all stages attackers can use to launch an attack and the SOC team can use them to identify, detect, prevent, and contain attack before it causes real damage to the organization.

Learn more
Cyber Security for Chemical Industry

26.08.2020

Cyber Security for Chemical Industry

Learn more
Choosing the Right DLP: Enterprise DLP vs Integrated DLP

24.08.2020

Choosing the Right DLP: Enterprise DLP vs Integrated DLP

Learn more
Why Cybersecurity for E-Sports Is Important

21.08.2020

Why Cybersecurity for E-Sports Is Important

Learn more
Cybersecurity in Hospitality Industry

19.08.2020

Cybersecurity in Hospitality Industry

Learn more
What is the Difference Between MSSP and MSP?

17.08.2020

What is the Difference Between MSSP and MSP?

Learn more
How to Maintain Service Oriented Architecture Security

14.08.2020

How to Maintain Service Oriented Architecture Security

Learn more
SCADA Cybersecurity Framework

12.08.2020

SCADA Cybersecurity Frameworkransom

SCADA stands for Supervisory Control and Data Acquisition. It is a control system architecture that comprises computer systems, networked data communications, and Graphical User Interface (GUI) for a high level process supervisory management.

Learn more
How Can Companies Protect Themselves Against Drive-By Cyber Attacks?

09.08.2020

How Can Companies Protect Themselves Against Drive-By Cyber Attacks?

Learn more
How Does XOR Cipher Work? - XOR Chipher Encryption

05.08.2020

How Does XOR Cipher Work?

Learn more