Threat Activity Map Operational Use Case
The Scenario I’ve been asked to prepare a security audit—and I only have the weekend! So I start to do my research, of course reading the many posts on LogRhythm’s website…but the weekend gets away from me. Instead of preparing,…
Read More
October 21, 2015
Protect Your Grid
LogRhythm’s Launch of NERC-CIP v.5 Compliance Module Assisting Customers in the transition from v3 to v5 On February 12, 2013, the Obama administration recognized the growing cyber threat to various critical U.S. infrastructure. In response, Obama issued Executive Order 13636…
Read More
October 16, 2015
Make Your Data Work for You
“Make your money work for you.” It’s something that I’ve heard financial planners say for years. But recently, I started correlating this notion with what we do on a daily basis. In talking with others in the info sec space,…
Read More
October 16, 2015
Using Expiring Lists in LogRhythm 7
As a multi-billion dollar company that makes everything, Acme Labs are rightly paranoid about the threats and resulting risks that they face. Just imagine if someone got a hold of their IP and used it for nefarious purposes. But, like…
Read More
October 15, 2015
Precision Search
With the release of LogRhythm 7, we introduced Precision Search. This feature helps you cut through the massive amount of data in your environment to identify specific information—all from one easy-to-use interface. With Precision Search, you can couple an unstructured…
Read More
October 14, 2015
A Picture Paints a Thousand Logs
The saying “a picture is worth a thousand words” has a lot of truth to it. And in the same manner, “a picture can be worth a thousand logs.” But how do you view the interactions of a thousand, a…
Read More
October 9, 2015