Blog

LogRhythm Blog

Check out the latest security tips and tricks, news, and insights and join in the conversation

DPA-Powered Dashboards

The Challenge Knowing What to Trust With the proliferation of top-level domains, threat actors are using all sorts of DNS tricks to entice people to engage with malicious sites or to mask malicious traffic in the noise of normal traffic.…

Read More

SIEM’s Total Cost of Ownership

Michael Suby, as Stratecast’s Vice President of Research in Frost & Sullivan, engages with his seasoned team of analysts and business strategists in defining research direction and in delivering impactful customer interactions. Leveraging a 15-year analyst career, Mr. Suby maintains…

Read More

Started Near the Bottom. Now We’re Here!

LogRhythm made its first appearance in the Gartner Magic Quadrant for SIEM as a Visionary back in 2008. At the time, ArcSight was the Goliath in the market in terms of market share, customer penetration, and momentum. David (aka LogRhythm)…

Read More

Who is Listening in on Your Network?

The Threat of Data Exfiltration with Packet Capture Software With the sheer volume of network traffic and the variety of applications that travel across a typical network these days, it is not surprising how easy it is to gather high-value…

Read More

Detecting Beaconing Malware with Network Monitor

The Difficulty in Detecting Beaconing Malware When it comes to threat detection, you’re taking great measures to protect your organization. Yet threats, such as malware, keep getting in despite the network monitoring tools and enterprise threat detection solutions you have…

Read More

See what we've been working on...

See how we're delivering on promises to better serve our customers