Blog

LogRhythm Blog

Check out the latest security tips and tricks, news, and insights and join in the conversation
Phishing hooks grabbing user information

Prepare Your Team to Identify New Phishing Attack Techniques

Phishing attacks began decades ago as simple spam, designed to trick recipients into visiting sites and becoming customers, and has since morphed into a worldwide criminal industry. Centered on social engineering — manipulation through deception — phishing has become not…

Read More
Computer screen of sourcing code.

What is the Zero Trust Model of Cybersecurity, Really?

The Zero Trust Model framework is the next evolution of our security model. Explore what exactly the Zero Trust model is and how companies have successfully implemented their own models. The Zero Trust Model Explained The original Zero Trust model…

Read More
Security operation center (SOC) team working in the office

What SOC Automation Tools Can Do for Your Team

Your analysts are efficient. They are creative problem solvers who prefer to spend their time putting those inventive skills to use rather than expending energy on mundane tasks. For example, logging into an active directory and unlocking a user account…

Read More

See what we've been working on...

See how we're delivering on promises to better serve our customers