Announcing LogRhythm 7!
Posted by: Chris Petersen
I’m excited to share LogRhythm 7 (LR7) with you today! We built LR7 to help organizations dramatically improve their ability to detect, respond to and neutralize threats. As you’ll see below, LR7 offers an extraordinary amount of innovation—and its significant…
Read More
October 8, 2015
Getting Started with Threat Intelligence
Posted by: Joe Partlow
Joe Partlow, CISO, is a guest blogger from ReliaQuest. He has been involved with InfoSec in some capacity or role for over 15 years, mostly on the defensive side, but has always been fascinated by those cool kids on offense.…
Read More
August 20, 2015
Cybersecurity in Asia: Keep Your Castle Safe
When it comes to a cyber-attack, it is no longer a question of if your company will be hacked but when. Companies from 2 to 10,000 will get hacked. There’s no question. If you think that’s bad news, then consider…
Read More
August 20, 2015
NetMon as a Programmatic Intrusion Detection System
Detect Threats, Passively Identify Devices and Selectively Capture Packets NetMon release 2.7.1 implements the ability to add custom scripting rules that can run on every packet or flow, allowing automatic analysis of network metadata. This capability allows for advanced intrusion…
Read More
August 13, 2015
LogRhythm Challenge: Black Hat 2015
Posted by: LogRhythm Labs
Collaboration between Thomas Hegel and Greg Foss. For Black Hat this year, Labs decided to try something new and put together a packet capture analysis challenge for the conference. The goal of the challenge was to find the secret launch…
Read More
August 13, 2015
PSRecon – Live Forensic Data Acquisition
Live incident response and forensic data acquisition is often a very manual and time consuming process that leaves significant room for error and can even result in the destruction of evidence. There are many people involved when investigating an incident, which makes…
Read More
August 5, 2015