Global Security Mag Online
  • français
  • english
  • allemand

Accueil > Les auteurs > Logpoint

Logpoint

Articles de cet auteur (15)

  • Logpoint poll reveals businesses are ’throwing money at nothing’ when it comes to their existing cybersecurity stack
  • 8base ransomware group significantly boosts activity level
  • LockBit: A deep-dive into the rapidly evolving RaaS gang and its unique business model
  • Analyse des Royal-Ransomware Exploits
  • Logpoint 2023 predictions: The year of the business-driven CISO
  • Cactus: Defending against a ransomware newcomer
  • Royal ransomware investigation: How to brace for the sharp increase
  • Cactus : Se défendre contre un nouveau venu chez les ransomwares
  • Cactus: der Ransomware-Neuling mit ausgefeilten TTPs
  • Global ransomware attack and Vesuvius - Logpoint comment
0 | 10

Les auteurs

  • Adil Baghir, Technology Consultant Lead, Middle East
  • Adrian Taylor, Regional VP of Sales at A10 Networks
  • Adrian Taylor, VP of EMEA at A10 Networks
  • Adrien Gendre, Chef Tech & Product Officer de Vade
  • Adrien Gendre, Directeur Associé, Architecte Solutions chez Vade (...)
  • Adrien Merveille, expert en cybersécurité chez Check Point Software (...)
  • Alan Bentley, VP of Vulnerability Management, Lumension
  • Alan Stewart–Brown, VP of EMEA at Opengear
  • Alastair Paterson, CEO and Co-Founder of Digital Shadows
  • Alex Hinchcliffe, analyste détection des menaces, Palo Alto Networks
  • Alexander Derricott, market analyst, IHS Technology
  • Alexander Moiseev, Chief Business Officer at Kaspersky
  • Alexander Moiseev, Directeur général de Kaspersky Lab Europe
  • Alexandre Lazarègue, Avocat spécialisé en droit du numérique
  • Alexei Lesnykh, business development manager at DeviceLock
  • Ali Neil, Director of International Security Solutions chez Verizon (...)
  • Ali Sleiman, Technical Director MEA at Infoblox
  • Alibaba DAMO Academy
  • Alon Schwartz, Security Researcher, Logpoint Global Services
  • amolsarwate dans The Laws of Vulnerabilities
... | 40 | 60 | 80 | 100 | 120 | 140 | 160 | 180 | 200 |...

2001 - 2024 Global Security Mag Online
Plan du site | Se connecter | Contact | RSS 2.0