Blog

LogRhythm Blog

Check out the latest security tips and tricks, news, and insights and join in the conversation
Man working on desktops in operations center

Leverage Your SIEM as Part of Your Zero Trust Strategy

Editor’s Note: This a partnered sponsored guest blog written by Avertium. Continuous monitoring is one of the most important facets of any Zero Trust architecture. The level of trust a system has in any user, application, or data flow may…

Read More
LogRhythm hackathon event

LogRhythm’s Hackathon Sparks New Innovation

Twice a year, the LogRhythm Research and Development team hosts an internal hackathon event to give our engineers an opportunity to collaborate, share innovative projects, and get awarded for their ideas. Past and present hackathon projects have inspired Product and…

Read More
U.S. government building

Implementing the OMB 21-31 Memorandum

The Russia–Ukraine conflict has significantly intensified the cyberthreat landscape. As state-sponsored threat actors collaborate with financially-motivated cybercriminals to launch targeted cyberattacks against critical infrastructures, the cyberthreat landscape has become a free-for-all arena. As a result, the FBI and the Cybersecurity…

Read More