Global Security Mag Online
  • français
  • english
  • allemand

Accueil > Les auteurs > Logpoint

Logpoint

Articles de cet auteur (15)

  • Logpoint poll reveals businesses are ’throwing money at nothing’ when it comes to their existing cybersecurity stack
  • 8base ransomware group significantly boosts activity level
  • LockBit: A deep-dive into the rapidly evolving RaaS gang and its unique business model
  • Analyse des Royal-Ransomware Exploits
  • Logpoint 2023 predictions: The year of the business-driven CISO
  • Cactus: Defending against a ransomware newcomer
  • Royal ransomware investigation: How to brace for the sharp increase
  • Cactus : Se défendre contre un nouveau venu chez les ransomwares
  • Cactus: der Ransomware-Neuling mit ausgefeilten TTPs
  • Global ransomware attack and Vesuvius - Logpoint comment
0 | 10

Les auteurs

  • Amyn Jaffer, Ultima Labs Director
  • Andre Durand, founder, and CEO of Ping Identity
  • André Schindler, DG EMEA chez NinjaOne
  • André Schindler, Directeur général EMEA chez NinjaRMM
  • Andrea Moscheni, Thermal Management Product Application Manager, Vertiv 
  • Andrew Shikiar, executive director de l’Alliance FIDO
  • Andy Robertson, Head of Fujitsu Cyber Security, Fujitsu UK&I
  • Animesh Jain dans The Laws of Vulnerabilities
  • Animesh Jain, Directrice des produits Signatures des vulnérabilités chez (...)
  • Animesh Jain, Directrice des produits Signatures des vulnérabilités chez (...)
  • Anthony Herbst, Channel Manager France de Citrix
  • Anthony Moillic, Director of Solutions Engineering EMEA et APAC chez (...)
  • Anthony Moillic, Director, Solutions Engineering EMEA et APAC chez NETWRIX (...)
  • Arnaud Crouzet, VP Security
  • Arnaud Gallut, Regional Sales Director chez Ping Identity
  • Ashish Gupta, Executive Vice President and Chief Marketing Officer at (...)
  • Avesta Hojjati, Head of R&D at DigiCert
  • Aviv Noy, CTO de Rivery
  • Babur Nawaz Khan, Technical Marketing Engineer at A10 Networks
  • Bastien Dubuc, Country Manager France chez Avast
... | 60 | 80 | 100 | 120 | 140 | 160 | 180 | 200 | 220 |...

2001 - 2024 Global Security Mag Online
Plan du site | Se connecter | Contact | RSS 2.0