Articles, News and Industry Tips

Read the latest articles on best practices, building customer-centric products, and the latest in cybersecurity.
Filters
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Threat Integrations
Loginsoft builds expertise in integrating Threat Intelligence sources into ThreatConnect (SOAR) platform

July 8, 2020

Open Source Security
Threat Intelligence
Network Security
Compliance & Risk Management
Explicating the Concepts of Osquery

June 25, 2020

Threat Intelligence
Open Source Security
How Osquery Works and How Osquery FIM benefits Security Researchers

June 25, 2020

Threat Intelligence
Vulnerability Management
Threat Integrations
Threat Detection with SIGMA Rules

June 17, 2020

Threat Intelligence
DevSecOps
Vulnerability Management
A New Approach to Accelerate Threat Detection

June 17, 2020

Threat Integrations
Source Integration with Anomali ThreatStream

June 15, 2020

Threat Integrations
Integration capability with MISP Open Source Threat Intelligence platform

May 29, 2020

Threat Integrations
Extending Splunk UI using Custom JS and CSS

April 17, 2020

Open Source Security
Driving the Diligence of Data Visualization

January 20, 2020

Network Security
Open Source Security
Vulnerability Management
Software Supply Chain Security
Shield your Firewall to Strive Against Sensitive Data Disclosure

October 29, 2019

Cloud Security
DevSecOps
Open Source Security
Vulnerability Management
Threat Intelligence
IoT'ization - Sharpening the 'Smart'ness of Digital World

January 17, 2019

Cloud Security
DevSecOps
Open Source Security
Vulnerability Management
Threat Intelligence
Heap Overflow Vulnerabilities and Concerned Threats

December 6, 2018

Sign up to our Newsletter