Blog

LogRhythm Blog

Check out the latest security tips and tricks, news, and insights and join in the conversation

Optimizing Threat Detection with LogRhythm NDR

Since we began our quarterly release cycle with LogRhythm NDR, we have been focusing on building a completely new user interface (UI) and introducing new features that help make the life of an analyst easier. Now that we’ve made significant…

Read More

Monitoring USB Usage with Windows Logs – Security Spotlight

The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about how you can…

Read More

On-Prem SIEM vs. Cloud-Native SIEM: Which One Is Right for You?

Security information and event management (SIEM) solutions are essential for organizations of all sizes to monitor their environment for security threats. SIEM solutions gather and scrutinize security logs originating from diverse sources like firewalls, intrusion detection systems, and web servers.…

Read More

Disable Windows Event Logging – Security Spotlight

The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about a technique attackers…

Read More

Detecting Token Impersonation – Security Spotlight

The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about a common method…

Read More

See what we've been working on...

See how we're delivering on promises to better serve our customers