Blog

Our next-gen SIEM & smart SOAR illustrate our expertise. So do the blog. Through our blog posts, deepen your knowledge on various SecOps topics or get updated about important news & modern approaches for cybersecurity. Get into the habit of reading valuable information provided by Logsign. Be a step ahead.

What is ICMP?

29.07.2020

What is ICMP?

Learn more
What is Stateful Packet Inspection?

27.07.2020

What is Stateful Packet Inspection?

Learn more
WarXing in Cyber Security

24.07.2020

WarXing in Cyber Security

Learn more
How to Use Honeypot for Network Intrusion Detection

22.07.2020

How to Use Honeypot for Network Intrusion Detection

Learn more
How to Prevent Shellcode Injection

20.07.2020

How to Prevent Shellcode Injection

Learn more
What is a Honeypot in Cybersecurity?

17.07.2020

What is a Honeypot in Cybersecurity?

Learn more
10 Steps to Prevent Man in the Middle Attacks

16.07.2020

10 Steps to Prevent Man in the Middle Attacks

Learn more
Data Stream Clustering Methods Examples

13.07.2020

Data Stream Clustering Methods Examples

Data stream clustering refers to the clustering of data that arrives continually such as financial transactions, multimedia data, or telephonic records.

Learn more
What is Adaptive Threat Protection?

10.07.2020

What is Adaptive Threat Protection?

According to McAfee, Adaptive Threat Protection (ATP) is an endpoint security’s optional module that analyzes an organizational content and decides action based on file rules, reputation, and reputation thresholds.

Learn more
Role of Soar for Managed Service Security Provider (MSSP)

08.07.2020

Role of Soar for Managed Service Security Provider (MSSP)

SOAR system offers automation, orchestration, response, configuration manager, dashboard, and multitenant solution to MSSP.

Learn more
Detecting Buffer Overflow and Buffer Overflow Attack Prevention

06.07.2020

Buffer Overflow Attack Prevention

Buffer Overflow Attack can be prevented using buffer overflow protection, avoid using c and c++ languages, bounds checking, use modern operating system, and executable space protection

Learn more
Role of Identity and Access Management in Cybersecurity

03.07.2020

Role of Identity and Access Management in Cybersecurity

In IT security debates, projects aimed at managing access and identifying users are considered fundamental. However, the processes and technologies for controlling permissions have proved challenging.

Learn more
How Can You Prevent Spyware and Adware?

22.06.2020

How Can You Prevent Spyware and Adware?

Learn more
Types of Wireless Network Attacks

19.06.2020

Types of Wireless Network Attacks

Learn more
What are the Benefits of a Security Risk Assessment?

17.06.2020

What are the Benefits of a Security Risk Assessment?

Learn more
What is P3P Policy and How Does it Work?

15.06.2020

What is P3P Policy and How Does it Work?

Learn more
What is Encapsulating Security Payload in Network Security?

12.06.2020

What is Encapsulating Security Payload in Network Security?

Learn more
How Does Identity-Based Encryption Work?

10.06.2020

How Does Identity-Based Encryption Work?

Learn more