Security Spotlight: Tips to Monitor Disabled and Deleted User Accounts
The ‘Security Spotlight’ series of blogs is written in accompaniment with the YouTube series of the same name, which is aimed at providing quick visibility and understanding into how you can leverage the LogRhythm platform against a variety of threats.…
Read More
September 25, 2023
What is SIEM? And How Does it Work?
Posted by: Kelsey Gast
What is SIEM? SIEM stands for security, information, and event management. SIEM tools aggregate log data, security alerts, and events into a centralized platform to provide real-time analysis for security monitoring. Security operation centers (SOCs) invest in SIEM software to…
Read More
September 18, 2023
Detecting a Phishing Email: 10 Things to Watch
Posted by: Eric Brown
As security professionals, we remain vigilant in identifying phishing attempts and actively seek information on defending against ransomware and phishing attacks. These topics hold paramount importance within the security community. It is well-known that phishing emails frequently serve as the…
Read More
September 18, 2023
Artificial Intelligence – A Danger to Patient Privacy?
Posted by: Mikiann McIntosh
Industries worldwide have integrated artificial intelligence (AI) into their systems as it promotes efficiency, increases productivity, and quickens decision-making. ChatGPT certainly raised eyebrows as it demonstrated similar characteristics at the start of its debut back in November 2022. The healthcare sector…
Read More
August 28, 2023
SaaS vs. Cloud-Native: Definitions and Security Best Practices
Posted by: Matt Willems
There’s a disconnect in how we talk about applications that are no longer hosted within our own data center. When speaking with customers, we’ve observed that “software as a service” (SaaS) and “cloud-native” are terms that tend to be bundled…
Read More
August 16, 2023
What Comes After Your SIEM Purchase?
Posted by: Kevin D. Kirkwood
Let’s say you recently acquired a security information and event Management (SIEM) solution and now have a new layer of defense in the war against cybercriminals. Check! You’re done right? Not even close. The reality is there is still a LOT more…
Read More
July 24, 2023