Temporal Chain Normalization: The Unsung Hero of Event Correlation
When it comes to correlation capabilities, LogRhythm has you covered. With AI Engine you can perform a variety of activities, from observing a single activity to applying advanced behavior rules across multiple dimensions (entities, devices, log sources, metadata, etc.). In…
Read More
September 22, 2016
LogRhythm Challenge: Black Hat 2016
Posted by: LogRhythm Labs
Collaboration between, Greg Foss, Nathaniel “Q” Quist, and Michael “Swish” Swisher For the LogRhythm Challenge at Black Hat USA this year, we wanted to give participants the opportunity to use several different analytic skills in their attempt to beat the…
Read More
September 20, 2016
DPA-Powered Dashboards
The Challenge Knowing What to Trust With the proliferation of top-level domains, threat actors are using all sorts of DNS tricks to entice people to engage with malicious sites or to mask malicious traffic in the noise of normal traffic.…
Read More
August 23, 2016
SIEM’s Total Cost of Ownership
Posted by: Michael Suby
Michael Suby, as Stratecast’s Vice President of Research in Frost & Sullivan, engages with his seasoned team of analysts and business strategists in defining research direction and in delivering impactful customer interactions. Leveraging a 15-year analyst career, Mr. Suby maintains…
Read More
August 22, 2016
A Practical Approach to Effective Security Analytics
Posted by: Phil Villella
When discussing effective approaches to the problem of security analytics, I think it is first important to start with a clear definition of the goal of security analytics. The ultimate goal of security analytics is to deliver technology solutions that…
Read More
August 22, 2016
Started Near the Bottom. Now We’re Here!
LogRhythm made its first appearance in the Gartner Magic Quadrant for SIEM as a Visionary back in 2008. At the time, ArcSight was the Goliath in the market in terms of market share, customer penetration, and momentum. David (aka LogRhythm)…
Read More
August 11, 2016