Blog

LogRhythm Blog

Check out the latest security tips and tricks, news, and insights and join in the conversation

NetMon and SSL Proxy Integration

The Encryption Paradox Security experts universally agree that network traffic must be encrypted to be considered secure, and many compliance standards and applications (let alone common sense) require it. However, encryption creates a paradox for network security monitoring. Encryption protects…

Read More

Threat Activity Map Operational Use Case

The Scenario I’ve been asked to prepare a security audit—and I only have the weekend! So I start to do my research, of course reading the many posts on LogRhythm’s website…but the weekend gets away from me. Instead of preparing,…

Read More

Protect Your Grid

LogRhythm’s Launch of NERC-CIP v.5 Compliance Module Assisting Customers in the transition from v3 to v5 On February 12, 2013, the Obama administration recognized the growing cyber threat to various critical U.S. infrastructure. In response, Obama issued Executive Order 13636…

Read More

Make Your Data Work for You

“Make your money work for you.” It’s something that I’ve heard financial planners say for years. But recently, I started correlating this notion with what we do on a daily basis. In talking with others in the info sec space,…

Read More

Using Expiring Lists in LogRhythm 7

As a multi-billion dollar company that makes everything, Acme Labs are rightly paranoid about the threats and resulting risks that they face. Just imagine if someone got a hold of their IP and used it for nefarious purposes. But, like…

Read More

Precision Search

With the release of LogRhythm 7, we introduced Precision Search. This feature helps you cut through the massive amount of data in your environment to identify specific information—all from one easy-to-use interface. With Precision Search, you can couple an unstructured…

Read More

See what we've been working on...

See how we're delivering on promises to better serve our customers