Blog

LogRhythm Blog

Check out the latest security tips and tricks, news, and insights and join in the conversation

Monitoring Virtual Network Computing – Security Spotlight

The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about monitoring Virtual Network…

Read More

Credential Dumping LSASS via comsvsc.dll – Security Spotlight

The ‘Security Spotlight’ series of blogs is written in accompaniment with the YouTube series of the same name, which is aimed at providing quick visibility and understanding into how you can leverage the LogRhythm platform against a variety of threats.…

Read More
LogRhythm Axon Cloud SIEM's case management feature

Cloud-Native SIEM Made Easy with LogRhythm Axon

With the ever widening talent gap in cybersecurity and the expanding complexity of the cloud, organizations need an intuitive Security Information and Event Management platform (SIEM) that ensures seamless threat detection, investigation, and response. That is why we built our…

Read More
Screenshot of the LogRhythm NDR dashboard.

Threat Hunting with LogRhythm NDR

At LogRhythm, we’re constantly looking for ways to make the life of a security analyst easier and that is why we are always listening to our customers to prioritize the features that matter. With this LogRhythm NDR release, we enhanced…

Read More
LogRhythm SIEM 7.14

Making Your Job Easier with LogRhythm 7.14

With the volume of data that flows into a security operations platform, it’s critical to ensure you’re following the right steps and workflow to onboard log sources. For some, the process can be cumbersome and disjointed, but that’s no longer…

Read More

See what we've been working on...

See how we're delivering on promises to better serve our customers