Blog

LogRhythm Blog

Check out the latest security tips and tricks, news, and insights and join in the conversation
Using an iPhone

Should I Monitor my Endpoints with SIEM?

Cybersecurity analysts often struggle with logging endpoints into their security information and event management (SIEM). This can cause major network blind spots and challenges for security teams conducting threat investigations. If you relate, you’re not alone! In this blog, we’ll…

Read More

PowerShell and Command Line Logging

With exploits, attacks, and hackers using PowerShell more and more, it’s critical to know when powershell.exe is running on a system and what commands run from within it. Windows Security logs can tell you that PowerShell.exe has been created, but…

Read More
Construction worker in a light rail tunnel

Critical Infrastructure Protection

In today’s cyberthreat landscape, threat actors are drawn to organizations that operate within critical infrastructure (CI) sectors, such as oil and gas, financial services, telecommunications, mass transportation, public healthcare, etc. When targeting legacy control systems operating within a critical infrastructure…

Read More
women working professionals

Celebrating Women in Cybersecurity on International Women’s Day!

International Women’s Day is a global day that celebrates the social, economic, cultural, and political achievements of women. Significant activity is witnessed worldwide as groups come together to celebrate women’s achievements or rally for women’s equality. This year, the theme…

Read More
LogRhythm's logo

A New Chapter for LogRhythm’s Brand

2022 is an exciting year for LogRhythm and I am elated to announce the launch of our new brand! As the cybersecurity industry evolves, so do we — our new look embodies a modern representation of our mission, purpose, and…

Read More

See what we've been working on...

See how we're delivering on promises to better serve our customers