How to Social Engineer Your Way into a Network
Hackers, hacktivists, scam artists and general bad guys are moving away from the traditional methods of writing software to infect and obtain information. Instead, there is a growing trend of social engineering attacks being used to steal employee credentials. These…
Read MoreDecember 28, 2015
What Do the Cyber Attacks of 2015 Tell Us About the Current State of IT Security?
Cybersecurity continued to be a problem for many companies in 2015, with several large financial institutions, retailers and insurance companies admitting to damaging breaches worth millions of dollars. The rise of cyber attacks is most likely here to stay. The…
Read MoreDecember 22, 2015
10 Security Predictions for 2016
Posted by: LogRhythm Labs
As we approach 2016, security experts are reflecting on the cyber attacks of this year and making predictions as to what the threat landscape may look like in the coming months. This year, there will be innovative security initiatives, different…
Read MoreDecember 22, 2015
Tracking Group Policy Changes: Part 3
Posted by: Andrew Hollister
This is the final part of the series on tracking group policy changes. As I have mentioned a couple of times, one thing that makes monitoring group policy changes difficult is the fact that Microsoft logs the GUID of the…
Read MoreDecember 16, 2015
Security Measures Retailers Should Have in Place
Posted by: Andrew Hollister
It’s the most wonderful time of the year! As the rush towards Christmas continues and spending reaches fever pitch, those tasked with protecting retail networks, Point-of-Sale (POS) systems, and online shopping sites might be tempted to think it’s the most…
Read MoreDecember 14, 2015
LogRhythm for DevOps
Using LogRhythm to Streamline Operations While the LogRhythm platform is typically used as a security solution, it is a flexible and powerful tool that can be used for operational use cases as well. LogRhythm’s ability to process a wide variety…
Read MoreDecember 11, 2015