Blog

LogRhythm Blog

Check out the latest security tips and tricks, news, and insights and join in the conversation

Plug Security Gaps by Identifying Remote Access Account Anomalies

Remote access has become crucial for business operations, as satellite employees and travelers need remote access to corporate networks. However, while remote access greatly benefits productivity, it also exposes the organization to a number of additional threats. Let’s look into…

Read More

Passive Discovery and Exploitation of Open SMB Shares

Server Message Block (SMB) shares are a critical component to most organizations—allowing for a central repository of files and other items that people need to access and share to do their jobs. Often, organizations will have multiple file shares in…

Read More

User Threat Detection—There’s a Module for That

End-user behavior can be difficult to baseline and monitor. Users often click on suspect links, open unknown attachments, and unknowingly expose the organization to risk. Where traditional analytics and perimeter defenses fall short, LogRhythm’s User and Entity Behavior Analytics (UEBA)…

Read More

Protect Your Business with LogRhythm and Palo Alto Networks

Enable Comprehensive End-to-End Threat Lifecycle Management Cyber criminals are compromising organizations at an unprecedented rate. To counter these attacks, security teams must leverage multiple security solutions to build and strengthen security operations. If done incorrectly, using multiple solutions isn’t a…

Read More

See what we've been working on...

See how we're delivering on promises to better serve our customers