University of Colorado Hackathon
Students Test Skills in Hacking Challenge On Saturday, April 16th, over 60 students from The University of Colorado Boulder braved the “snowpocalypse” to participate in the Interdisciplinary Telecom Program (ITP) Security Hackathon sponsored by LogRhythm. The students consisted of mostly…
Read More
April 29, 2016
WebConsole Cyber Kill Chain
The Challenge Tough times call for tough measures. What better way to visualize those measures than through the cyber kill chain? The Cyber Kill Chain is a method developed by Lockheed Martin to gain further insight into what stage a…
Read More
April 27, 2016
SMS Alerting Via SmartResponse
The Problem Security analysts can’t always dedicate their time to monitoring the security operations center (SOC), nor do they always check the alerts that they receive via email, due to various reasons. Also, some alerts are simply more important than…
Read More
April 21, 2016
LogRhythm Threat Intelligence Services (TIS): STIX via TAXII
Here at LogRhythm, we are excited to announce an updated release of our Threat Intelligence Services (TIS). If you’re not familiar with TIS, its easy-to-use utility enables LogRhythm customers to rapidly add and configure a wide array of threat feeds…
Read More
April 20, 2016
Palo Alto Networks Ignite 2016
LogRhythm was a proud sponsor at the recent Palo Alto Networks 2016 Ignite Conference in Las Vegas. It was a fantastic three-day event where we not only got to meet many existing customers and technology partners, but we also were…
Read More
April 19, 2016
When Incident Response is Critical, LogRhythm Forensic Co-Pilot Services Can Help
With the growing severity and volume of cyber threats, it’s inevitable that many organizations will fall victim to a breach that results in the loss of sensitive information. In 2015, the Ponemon Institute calculated that malicious attacks take an average…
Read More
April 13, 2016