Blog

LogRhythm Blog

Check out the latest security tips and tricks, news, and insights and join in the conversation

Learn How to Automatically Mitigate Threats

Detecting new and unique attacks requires a different strategy to the traditional prevention-centric model of IT security. The traditional model looks like a coconut. Tough on the outside, soft (or non-existent) on the inside. Organizations are well-trained in deploying firewalls,…

Read More

Detecting and Ending Long-Running Processes

The Challenge: Processes Gone Wild It is fairly straightforward to correlate and alert on activity you have a log message for, but what about in the scenario where there’s no log or audit message. How do you detect when someone…

Read More

Detecting and Blocking Suspicious Internal Network Traffic

Internal network traffic in an organization can be as nefarious as an outside hacker trying to gain access to sensitive information. Every organization needs visibility into their network, both internal and external, in order to detect and respond to threats.…

Read More

Case Enhancements in LogRhythm 7.1.5

LogRhythm 7 has made great strides in empowering organizations to detect, respond to and neutralize damaging cyber threats. The 7.1.5 release, came packed with even more enhancements and features to help you stay one step ahead of today’s most advanced…

Read More

Rapid-Fire Reactions from the RSA USA 2016 Conference

This week, the world gathered to talk cybersecurity at the 2016 RSA Conference. During the conference, Mario Vuksan, CEO of Reversing Labs, presented on the threats of greatest consequence heading into 2016. As the attack surface exponentially increases, it’s becoming…

Read More

See what we've been working on...

See how we're delivering on promises to better serve our customers