Stoking fears about the threat landscape is a popular approach, and one that I don’t particularly care...
One of the biggest buzzwords (or really, buzz acronyms) to pop up in the cybersecurity space in...
Machine learning has infiltrated the world of security tooling over the last five years. That’s part of...
InfoSec, like any other aspect of IT, is a matter of three factors coming together: people, process...
The cyberthreat landscape has expanded in recent years, accelerated by enterprises promoting remote work and more reliance...
For Summer 2022, Logz.io is thrilled to have earned six G2 Research Badges for our Cloud SIEM...
Regardless of economic conditions, IT usually operates under an axiom no one in business ever likes to...
On December 9, a severe remote code vulnerability was revealed in Apache’s Log4J library, a Java-based logging...
In the domain of cyber threat response, there’s a critical resource that every organization is desperately seeking...
Microsoft recently announced a campaign by a sophisticated nation-state threat actor, operating from China, to exploit a...
Elastic moved from an open source license for Elasticsearch and Kibana to a “source available” (aka closed...
What’s Next For Observability? Tell Us What You Think