Blog

LogRhythm Blog

Check out the latest security tips and tricks, news, and insights and join in the conversation

How to Social Engineer Your Way into a Network

Hackers, hacktivists, scam artists and general bad guys are moving away from the traditional methods of writing software to infect and obtain information. Instead, there is a growing trend of social engineering attacks being used to steal employee credentials. These…

Read More

10 Security Predictions for 2016

As we approach 2016, security experts are reflecting on the cyber attacks of this year and making predictions as to what the threat landscape may look like in the coming months. This year, there will be innovative security initiatives, different…

Read More

Tracking Group Policy Changes: Part 3

This is the final part of the series on tracking group policy changes. As I have mentioned a couple of times, one thing that makes monitoring group policy changes difficult is the fact that Microsoft logs the GUID of the…

Read More

Security Measures Retailers Should Have in Place

It’s the most wonderful time of the year! As the rush towards Christmas continues and spending reaches fever pitch, those tasked with protecting retail networks, Point-of-Sale (POS) systems, and online shopping sites might be tempted to think it’s the most…

Read More

LogRhythm for DevOps

Using LogRhythm to Streamline Operations While the LogRhythm platform is typically used as a security solution, it is a flexible and powerful tool that can be used for operational use cases as well. LogRhythm’s ability to process a wide variety…

Read More

See what we've been working on...

See how we're delivering on promises to better serve our customers