Blog

LogRhythm Blog

Check out the latest security tips and tricks, news, and insights and join in the conversation

Getting Started with Threat Intelligence

Joe Partlow, CISO, is a guest blogger from ReliaQuest. He has been involved with InfoSec in some capacity or role for over 15 years, mostly on the defensive side, but has always been fascinated by those cool kids on offense.…

Read More

Cybersecurity in Asia: Keep Your Castle Safe

When it comes to a cyber-attack, it is no longer a question of if your company will be hacked but when. Companies from 2 to 10,000 will get hacked. There’s no question. If you think that’s bad news, then consider…

Read More

NetMon as a Programmatic Intrusion Detection System

Detect Threats, Passively Identify Devices and Selectively Capture Packets NetMon release 2.7.1 implements the ability to add custom scripting rules that can run on every packet or flow, allowing automatic analysis of network metadata. This capability allows for advanced intrusion…

Read More

LogRhythm Challenge: Black Hat 2015

Collaboration between Thomas Hegel and Greg Foss. For Black Hat this year, Labs decided to try something new and put together a packet capture analysis challenge for the conference. The goal of the challenge was to find the secret launch…

Read More

PSRecon – Live Forensic Data Acquisition

Live incident response and forensic data acquisition is often a very manual and time consuming process that leaves significant room for error and can even result in the destruction of evidence. There are many people involved when investigating an incident, which makes…

Read More

Floating to Work

Well, I guess it was more like riding the rapids to work in the “express” lane. On July 14th, about 200 people “commuted” to work by tubing down Boulder Creek in the annual Tube to Work Day, an event that…

Read More

See what we've been working on...

See how we're delivering on promises to better serve our customers