Blog

LogRhythm Blog

Check out the latest security tips and tricks, news, and insights and join in the conversation

Announcing the Winners of the Rule Your Network Challenge

Wrapping Up the Rule Your Network Hackathon Challenge Over the summer, LogRhythm hosted our first-ever public NetMon Hackathon on DevPost. The Rule Your Network Challenge offered large cash prizes for entries into each of the following categories: Novel Threat Detection…

Read More

The Reality of Ransomware

As the ransomware landscape continues to quickly change and evolve, every CISO also needs to evolve their business continuity and disaster recovery plans to ensure the impacts of ransomware can be minimized. If you haven’t updated your business continuity and…

Read More

What is the GDPR and How Can You Prepare?

The General Data Protection Regulation (GDPR) is the world’s first attempt at implementing big data compliance regulation, and it seems to be inspiring some fear throughout the compliance industry. Now that GDPR has come to combat the uptick in cyberattacks,…

Read More

Integrated Endpoint Protection and Response

Partnership Spotlight: Carbon Black Maintaining visibility of hundreds—if not thousands—of endpoints and then taking corrective actions to the discovered abnormalities is a critical security challenge many organizations face today. Most organizations dedicate substantial portions of their budgets on endpoint protection…

Read More

Breaking Down the Anatomy of a Phishing Attack

Anatomy of a Phishing Attack Detecting a spear phishing attack can often be like searching for a needle in haystack. However, your security operation center (SOC) analysts can use LogRhythm’s SmartResponseâ„¢ and AI Engine to rapidly detect and respond to…

Read More

See what we've been working on...

See how we're delivering on promises to better serve our customers