Blog

LogRhythm Blog

Check out the latest security tips and tricks, news, and insights and join in the conversation
LogRhythm Web Console Used to Quickly and Easily Visualize Okta Data

Take the First Steps Toward a Zero-Trust Model with Okta Automation

Managing multiple accounts across various cloud and on-premise infrastructures centrally is a challenge for most security operations centers. To address this ever-increasing need, the LogRhythm Office of the CISO recently implemented Okta. Okta enables a nearly seamless management process for…

Read More
Cyberattack Trends Reported in the 2017 Verizon Data Breach Investigations Report

Augmenting Your Cyber Resiliency Strategy with NextGen SIEM

The cybersecurity challenge centers around a fundamentally simple concept: Email keeps businesses running and stores critically important corporate and personal data, but email is also the top vector for cyberattacks. The cyberattack trends and numbers speak volumes: Figure 1: Cyberattack…

Read More

Organizations Are Failing at Timely Detection of Threats

In today’s security space, we’re all too familiar with the challenges presented by industry-wide shortages in talent, budget, and dedicated security infrastructure. Many insights from the LogRhythm 2018 Cybersecurity: Perceptions & Practices benchmark survey confirm this common understanding, yet one…

Read More
PlugX Component Files

Take a Deep Dive into PlugX Malware

In June 2017, Palo Alto’s Unit 42 Threat Research team published an excellent blog post on a newly detected version of the PlugX malware family, also known as “Korplug.” Interested to find out more about this new variant, I started…

Read More

See what we've been working on...

See how we're delivering on promises to better serve our customers