Learn How to Automatically Mitigate Threats
Detecting new and unique attacks requires a different strategy to the traditional prevention-centric model of IT security. The traditional model looks like a coconut. Tough on the outside, soft (or non-existent) on the inside. Organizations are well-trained in deploying firewalls,…
Read More
March 18, 2016
Detecting and Ending Long-Running Processes
The Challenge: Processes Gone Wild It is fairly straightforward to correlate and alert on activity you have a log message for, but what about in the scenario where there’s no log or audit message. How do you detect when someone…
Read More
March 14, 2016
Harnessing Your SIEM for Cyberthreat Intelligence
Posted by: Matt Willems
In the world of cybersecurity, cyberthreat intelligence (CTI) burst on to the scene in a big way in 2015. Everyone wants useful data and analytical tools for next-gen cybersecurity in order to detect and respond to threats faster. The industry…
Read More
March 8, 2016
Detecting and Blocking Suspicious Internal Network Traffic
Internal network traffic in an organization can be as nefarious as an outside hacker trying to gain access to sensitive information. Every organization needs visibility into their network, both internal and external, in order to detect and respond to threats.…
Read More
March 7, 2016
Case Enhancements in LogRhythm 7.1.5
LogRhythm 7 has made great strides in empowering organizations to detect, respond to and neutralize damaging cyber threats. The 7.1.5 release, came packed with even more enhancements and features to help you stay one step ahead of today’s most advanced…
Read More
March 7, 2016
Rapid-Fire Reactions from the RSA USA 2016 Conference
Posted by: Matt Willems
This week, the world gathered to talk cybersecurity at the 2016 RSA Conference. During the conference, Mario Vuksan, CEO of Reversing Labs, presented on the threats of greatest consequence heading into 2016. As the attack surface exponentially increases, it’s becoming…
Read More
March 3, 2016