RSA Bound: Thoughts from a First Timer and Industry Newbie
RSA 2017: My First RSA Conference I’m heading out to my first RSA conference experience in just under a week. After much discussion with my director, we decided it would be a good use of my 2017 training dollars to…
Read More
February 9, 2017
Plug Security Gaps by Identifying Remote Access Account Anomalies
Remote access has become crucial for business operations, as satellite employees and travelers need remote access to corporate networks. However, while remote access greatly benefits productivity, it also exposes the organization to a number of additional threats. Let’s look into…
Read More
February 9, 2017
Passive Discovery and Exploitation of Open SMB Shares
Server Message Block (SMB) shares are a critical component to most organizations—allowing for a central repository of files and other items that people need to access and share to do their jobs. Often, organizations will have multiple file shares in…
Read More
January 24, 2017
User Threat Detection—There’s a Module for That
Posted by: Matt Willems
End-user behavior can be difficult to baseline and monitor. Users often click on suspect links, open unknown attachments, and unknowingly expose the organization to risk. Where traditional analytics and perimeter defenses fall short, LogRhythm’s User and Entity Behavior Analytics (UEBA)…
Read More
January 19, 2017
Cybersecurity Advice for President-Elect Trump: Maintain Bi-Partisan Momentum and Step on the Gas
Posted by: Chris Petersen
As Donald Trump prepares to assume the presidency, cybersecurity strategy should be high on his priority list. Time is of the essence, as those who want to cause harm are not taking a hiatus as our country moves through this…
Read More
January 17, 2017
Protect Your Business with LogRhythm and Palo Alto Networks
Enable Comprehensive End-to-End Threat Lifecycle Management Cyber criminals are compromising organizations at an unprecedented rate. To counter these attacks, security teams must leverage multiple security solutions to build and strengthen security operations. If done incorrectly, using multiple solutions isn’t a…
Read More
January 10, 2017