Log Ingestion 101: Which Logs Should You Be Bringing Into Your SIEM?
Posted by: Gabrielle Hempel
Security information and event management (SIEM) tools are indispensable in an organization’s cybersecurity framework. SIEM tools collect, analyze, and correlate log data from various devices and applications across an organization to identify suspicious activities, enhance overall security posture, and ensure…
Read More
November 2, 2023
Enhance Your Reporting with Grafana – Security Spotlight
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about enhancing your reporting…
Read More
November 2, 2023
Remote Desktop Protocol Misuse – Security Spotlight
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about Remote Desktop Protocol…
Read More
October 30, 2023
Detecting AWS Unauthenticated Cross-Account Attacks – Security Spotlight
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. Amazon Web Services (AWS) has a shared responsibility model that brings…
Read More
October 26, 2023
Account Discovery: Windows – Security Spotlight
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about how adversaries may…
Read More
October 24, 2023
Monitoring BITSAdmin Misuse – Security Spotlight
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about BITS, and…
Read More
October 17, 2023