Articles, News and Industry Tips

Read the latest articles on best practices, building customer-centric products, and the latest in cybersecurity.
Filters
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Vulnerability Management
Compliance & Risk Management
Open Vulnerability Assessment Language (OVAL) in a Nutshell

January 7, 2022

Threat Integrations
Palo Alto Networks Cortex XSOAR Integration

September 9, 2021

Threat Integrations
Is it time for leading Threat Intelligence Platforms to support custom objects such as Wallet IDs, Cryptocurrency address for Cryptocurrency Threat Intelligence providers?

August 23, 2021

Threat Intelligence
Vulnerability Management
Emerging Threats and Vulnerabilities in Cybersecurity

June 3, 2021

Threat Integrations
Fast Incident Response (FIR) Integration with Threat Intelligence Management Platform (IMP)

March 26, 2021

Threat Integrations
How can you speed up Incident Response on ServiceNow for Automated Enrichment of security incidents using Threat Intelligence ?

February 19, 2021

Threat Integrations
IBM QRadar Use Cases

February 5, 2021

Threat Integrations
Is Microsoft Azure Sentinel your next Implementation? Learn how Loginsoft integrated Sentinel with data source

September 9, 2020

Threat Integrations
Loginsoft builds expertise in integrating Threat Intelligence source with ThreatQuotient's Threat Intelligence Platform

August 13, 2020

Threat Integrations
Loginsoft builds expertise in integrating Threat Intelligence sources into ThreatConnect (SOAR) platform

July 8, 2020

Open Source Security
Threat Intelligence
Network Security
Compliance & Risk Management
Explicating the Concepts of Osquery

June 25, 2020

Threat Intelligence
Open Source Security
How Osquery Works and How Osquery FIM benefits Security Researchers

June 25, 2020

Subscribe to our Newsletter