Blog

LogRhythm Blog

Check out the latest security tips and tricks, news, and insights and join in the conversation

Breaking Down the Anatomy of a Phishing Attack

Anatomy of a Phishing Attack Detecting a spear phishing attack can often be like searching for a needle in haystack. However, your security operation center (SOC) analysts can use LogRhythm’s SmartResponse™ and AI Engine to rapidly detect and respond to…

Read More

Mamba Ransomware Analysis

Mamba Ransomware Background In September of 2016, a strain of ransomware was found in the wild which performed full disk encryption. According to Kaspersky Lab researchers1, this ransomware strain named “Mamba” now appears to be re-circulating, primarily in Brazil and…

Read More

First Financial Bank Unifies Threat Data and Streamlines Response

LogRhythm Enables Comprehensive Visibility and Enhanced Incident Workflows When Michael Cole took on his new role as Chief Information Security Officer at First Financial Bank (NASDAQ:FFIN), he inherited a fragmented security operations program that provided a limited visibility into the…

Read More

How to Make Your SIEM Speak

Your security teams can be responsible for managing a number of logs, so how do you make malicious behavior and alerts stand out? Using LogRhythm’s SmartResponse™, you can make your SIEM speak to you and audibly alert to a threat.…

Read More

See what we've been working on...

See how we're delivering on promises to better serve our customers