Exploring Legitimate Interest within the GDPR
Learn about legitimate interest as it relates to GDPR, when you have a justification to process personal data, and the impact on security-focused teams
Read MoreLearn about legitimate interest as it relates to GDPR, when you have a justification to process personal data, and the impact on security-focused teams
Read MoreLearn how to keep your open shortest path first (OSPF) routing protocol networks safe from attackers while detecting and responding to eavesdropping attacks.
Read MoreAuto forwarding is a common technique for phishing attacks that threat actors use to gain persistence after compromising an email account. Learn how to detect and prevent this malicious practice
Read MoreThe results from the 2019 Scalar Security Study are in. The cross-industry survey of 407 Canadian IT Security and Risk & Compliance professionals signifies the growing reach of costly cyber breaches across the country. This study highlights a few important takeaways on the state of cybersecurity readiness in Canada that we'll cover in this post.
Read MoreLearn how LogRhythm's SOAR capabilities automate all too common security operations tasks and in turn help better utilize your analysts' time.
Read MoreWhen we set out to redefine what security information and event management (SIEM) needed to be, our mission was quite simple — help organizations better...
Read MoreAs a security company, our first priority is sharing relevant tools and content to make sure you can detect to respond to threats faster and more efficiently. To make this happen, there’s a lot that goes on behind the scenes; today, we’d like to give you a glimpse into the activities of our engineering team.
Read MoreLogRhythm 7.4 offers security orchestration and automation (SOAR) capabilities and TrueIdentity™ for UEBA. Learn how the recent release is improving our customers’ lives.
Read MoreBig data — it’s all the rage in the technology industry right now, and for good reason. Data holds information that, if analyzed properly, reveal invaluable insights that you can use for just about anything — from streamlining internal processes to delivering better health care. But given the potential complexity of its use cases, big data products take a lot of work and planning to execute properly. LogRhythm has first-hand experience with big data products, given our development of CloudAI. LogRhythm CloudAI combines a wide array of behavioral models with artificial intelligence (AI) and machine learning (ML) to detect and characterize shifts in how users interact with the IT environment. This helps security teams detect hidden and advanced threats.
Read MoreGartner recognized LogRhythm as a Leader in their recent release of Gartner’s Magic Quadrant for SIEM. Learn about our continued market leadership.
Read More