Achieving Intelligent Infrastructure Defense with LogRhythm’s Co-Pilot Service and Security Analytics
Retailers have learned hard lessons in recent years, as organizations such as Target have suffered major data breaches. In Target’s case, the compromised credit card information of 70 million customers have resulted in significant expense, lost revenues, and a damaged…
Read More
January 5, 2017
The Top 8 Things to Analyze in Your Network to Detect a Compromised System
Back in August, I had an amazing conversation with Randy Franklin Smith of Ultimate Windows Security during a webinar. We talked about how to identify a number of security scenarios simply by looking at network traffic. If you missed the…
Read More
December 9, 2016
Detecting the BlackNurse DDoS Attack with LogRhythm NetMon
The security operations center (SOC) at Danish telecoms operator TDC recently published a report with regards to an ICMP based DoS/DDoS style of attack. This attack effectively makes use of ICMP type 3 and code 3 crafted packets to drain…
Read More
December 6, 2016
Avoid Major Data Breaches with Effective Threat Lifecycle Management
Posted by: Chris Petersen
A New Approach to Cybersecurity It’s a simple concept: The earlier you detect and mitigate a threat, the less the ultimate cost to your business. Implementing an effective end-to-end threat management process that focuses on reducing detection and response times…
Read More
December 1, 2016
The Best Gets Better: Introducing LogRhythm 7.2
Posted by: Chris Petersen
I’m excited to share our latest release, LogRhythm 7.2. It arms your team with the ability to detect, respond to, and neutralize threats before they result in damaging cyber incidents like a data breach. LogRhythm 7.2 builds upon the groundbreaking…
Read More
November 29, 2016
The Definitive Guide to Security Intelligence and Analytics
Posted by: Karen Scarfone
Karen Scarfone has nearly 25 years of professional IT experience, with over 15 years of that dedicated to information security. As a managing consultant at CyberEdge, Karen oversees security content development, custom research, and publishing projects. My colleague, Steve Piper,…
Read More
November 15, 2016