NetMon and SSL Proxy Integration
The Encryption Paradox Security experts universally agree that network traffic must be encrypted to be considered secure, and many compliance standards and applications (let alone common sense) require it. However, encryption creates a paradox for network security monitoring. Encryption protects…
Read More
October 26, 2015
Threat Activity Map Operational Use Case
The Scenario I’ve been asked to prepare a security audit—and I only have the weekend! So I start to do my research, of course reading the many posts on LogRhythm’s website…but the weekend gets away from me. Instead of preparing,…
Read More
October 21, 2015
Protect Your Grid
LogRhythm’s Launch of NERC-CIP v.5 Compliance Module Assisting Customers in the transition from v3 to v5 On February 12, 2013, the Obama administration recognized the growing cyber threat to various critical U.S. infrastructure. In response, Obama issued Executive Order 13636…
Read More
October 16, 2015
Make Your Data Work for You
“Make your money work for you.” It’s something that I’ve heard financial planners say for years. But recently, I started correlating this notion with what we do on a daily basis. In talking with others in the info sec space,…
Read More
October 16, 2015
Using Expiring Lists in LogRhythm 7
As a multi-billion dollar company that makes everything, Acme Labs are rightly paranoid about the threats and resulting risks that they face. Just imagine if someone got a hold of their IP and used it for nefarious purposes. But, like…
Read More
October 15, 2015
Precision Search
With the release of LogRhythm 7, we introduced Precision Search. This feature helps you cut through the massive amount of data in your environment to identify specific information—all from one easy-to-use interface. With Precision Search, you can couple an unstructured…
Read More
October 14, 2015