An Overview of Cloud-Native Security Approaches
Posted by: David Balaban
Responsibility for cloud security is shared between the cloud service provider’s (CSP) security department and the corporate information security team. In order to ensure compliance, visibility, and control across the entire stack of applications, the cloud service providers and various…
Read More
October 15, 2021
How to Raise Your Organization’s Game to Combat Cybercriminals
Editor’s Note: This guest blog is written from Avertium, a 2021 RhythmWorld platinum sponsor. Read on to explore tips that will help you improve your health care cybersecurity posture from their white paper, How to Raise Your Organization’s Game to Combat…
Read More
October 13, 2021
Creating Your Team of Security Intelligence Champions
Editor’s Note: This guest blog is written from Recorded Future’s perspective and shares key excerpts from the second edition of their popular book, “The Threat Intelligence Handbook: Moving Toward a Security Intelligence Program.” Your Threat Intelligence Journey Throughout Recorded Future’s…
Read More
October 4, 2021
3 Reasons to Attend RhythmWorld 2021
Posted by: Private: Cindy Zhou
RhythmWorld is back and better than ever before! LogRhythm’s fifth annual cybersecurity conference starts Tuesday, October 12th, and we’ve already surpassed last year’s record-breaking attendance numbers. We are taking this year’s RhythmWorld agenda to the next level — the schedule…
Read More
September 27, 2021
Detecting AWS Unauthenticated Cross-Account Attacks
Posted by: Ashok Chokalingam
Amazon Web Services (AWS) has a shared responsibility model that brings new cybersecurity challenges to organizations and professionals learning how to manage cloud security. As your business grows and data increases, the complexity of managing so much information across teams…
Read More
September 20, 2021
Cyber Kill Chain Steps and How to Defend Against APTs
The Cyber Kill Chain® methodology was developed by the military defense firm, Lockheed Martin, to address cyberattacks by identifying the pattern and behavior of cybercriminals as they carry out an attack. These actions are referred to as cyber kill phases.[1]…
Read More
September 13, 2021