Optimizing Threat Detection with LogRhythm NDR
Posted by: Derek Watkins
Since we began our quarterly release cycle with LogRhythm NDR, we have been focusing on building a completely new user interface (UI) and introducing new features that help make the life of an analyst easier. Now that we’ve made significant…
Read MoreJanuary 3, 2024
Detecting OS Credential Dumping done via WDigest – Security Spotlight
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about OS Credential Dumping…
Read MoreDecember 21, 2023
Monitoring USB Usage with Windows Logs – Security Spotlight
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about how you can…
Read MoreDecember 14, 2023
On-Prem SIEM vs. Cloud-Native SIEM: Which One Is Right for You?
Security information and event management (SIEM) solutions are essential for organizations of all sizes to monitor their environment for security threats. SIEM solutions gather and scrutinize security logs originating from diverse sources like firewalls, intrusion detection systems, and web servers.…
Read MoreDecember 8, 2023
Disable Windows Event Logging – Security Spotlight
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about a technique attackers…
Read MoreNovember 28, 2023
Detecting Token Impersonation – Security Spotlight
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about a common method…
Read MoreNovember 21, 2023