Skip to content

News archive

  • There’s no one cyber tool that can protect your enterprise against Log4Shell. A combination of tools and a defense-in-depth mindset will give organizations the ability to detect post-compromise activity and stop the attack.

    Tackling Log4Shell requires a defence-in-depth strategy

    The Log4Shell vulnerability is serious – it’s difficult to detect, used in lots and lots of software, and is the perfect vehicle to get malware into your network. There’s no one cyber tool that can protect your enterprise against Log4Shell. A combination of tools and a defense-in-depth mindset will give organizations the ability to detect post-compromise activity and stop the attack.

  • Fighting the ransomware war

    Fighting the ransomware war

    By LogPoint CTO Christian Have
    Ransomware attacks are becoming increasingly devastating to companies. Not only do they inflict massive disruptions to operations, but criminals are also asking for ever-larger ransoms to unlock the encrypted files and machines hit by the attacks.
    Throughout the last months, state-sponsored ransomware attacks inflicting damage on critical infrastructure have d