RhythmWorld 2020 Security Conference is Going Virtual
Our annual RhythmWorld Security Conference is a source of pride for the entire LogRhythm team. We love interacting with our customers and partners in person every year and aim to exceed expectations with world-class speakers, content, entertainment, and fun networking…
Read More
June 18, 2020
4 Key Processes to Maximize Security Operations Center Procedure Effectiveness
Posted by: Amy Tierney
Building a security operations center (SOC) is a major undertaking, but it’s worth the effort to keep your organization secure. To create an efficient SOC, you need to develop security operations center procedures that connect people, processes, and technologies within…
Read More
June 4, 2020
LogRhythm Joins NCCoE’s Technology Collaborators to Help Secure Telehealth Remote Patient Monitoring Ecosystem
It is with great excitement that I share LogRhythm’s involvement in the newest healthcare project from the National Cybersecurity Center of Excellence (NCCoE) — Securing Telehealth Remote Patient Monitoring Ecosystem. The project aims to provide a reference architecture that will…
Read More
May 21, 2020
A Security Analyst’s Guide to Monitoring Remote VPN Activity in the LogRhythm SIEM
Posted by: Brian Coulson
Remote work is no longer a trend, and is becoming the norm for many companies. Whether your organization has been practicing remote work for a while, or it is just beginning to adopt work-from-home policies, VPN monitoring — the ability…
Read More
May 21, 2020
Use Case: Detect and Respond to Malware Traffic with NDR
Posted by: Amy Tierney
As malicious actors continue to use a variety of techniques to evade detection, it’s paramount to protect your organization’s network activity. You need a solution that can detect and prevent malicious network activity. One solution is network detection and response…
Read More
May 21, 2020
Prevent Data Exfiltration with Network Traffic Analytics
When it comes to company data, you need to protect it at all costs. But it is hard to defend what you can’t see. This blog post will explore techniques threat actors commonly use to illegally copy an organization’s data,…
Read More
May 7, 2020