Blog

LogRhythm Blog

Check out the latest security tips and tricks, news, and insights and join in the conversation
The types of users in your organization

Protect Yourself Against User-Based Threats with UEBA

Understanding Suspicious User Types in Your Organization Whether unintentional or malicious in nature, user-based threats can have devastating consequences on your organization. While your focus may be on protecting your organization from outside incidents, you also need to guard yourself…

Read More

Creating and Managing Playbooks with LogRhythm APIs

New to LogRhythm 7.4: Playbooks Feature Set Standard procedures have been a cornerstone of security best practice since their invention. You may call them runbooks, standing procedures, checklists, or playbooks. Either way, you likely have one or more collections of…

Read More

See what we've been working on...

See how we're delivering on promises to better serve our customers