LogRhythm Blog

Check out the latest security tips and tricks, news, and insights and join in the conversation

An Overview of Cloud-Native Security Approaches

Responsibility for cloud security is shared between the cloud service provider’s (CSP) security department and the corporate information security team. In order to ensure compliance, visibility, and control across the entire stack of applications, the cloud service providers and various…

Read More
Office floor with people working on computers.

Creating Your Team of Security Intelligence Champions

Editor’s Note: This guest blog is written from Recorded Future’s perspective and shares key excerpts from the second edition of their popular book, “The Threat Intelligence Handbook: Moving Toward a Security Intelligence Program.” Your Threat Intelligence Journey Throughout Recorded Future’s…

Read More
RhythmWorld Security Conference 2021 banner

3 Reasons to Attend RhythmWorld 2021

RhythmWorld is back and better than ever before! LogRhythm’s fifth annual cybersecurity conference starts Tuesday, October 12th, and we’ve already surpassed last year’s record-breaking attendance numbers. We are taking this year’s RhythmWorld agenda to the next level — the schedule…

Read More
Computer with a lock on the keypad

Cyber Kill Chain Steps and How to Defend Against APTs

The Cyber Kill Chain® methodology was developed by the military defense firm, Lockheed Martin, to address cyberattacks by identifying the pattern and behavior of cybercriminals as they carry out an attack. These actions are referred to as cyber kill phases.[1]…

Read More