Blog

LogRhythm Blog

Check out the latest security tips and tricks, news, and insights and join in the conversation

Account Discovery: Windows – Security Spotlight

The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about how adversaries may…

Read More

Monitoring BITSAdmin Misuse – Security Spotlight

The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks.  In this Security Spotlight, we’ll be talking about BITS, and…

Read More

Monitoring Virtual Network Computing – Security Spotlight

The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about monitoring Virtual Network…

Read More
LogRhythm Axon Cloud SIEM's case management feature

Cloud-Native SIEM Made Easy with LogRhythm Axon

With the ever widening talent gap in cybersecurity and the expanding complexity of the cloud, organizations need an intuitive Security Information and Event Management platform (SIEM) that ensures seamless threat detection, investigation, and response. That is why we built our…

Read More
Screenshot of the LogRhythm NDR dashboard.

Threat Hunting with LogRhythm NDR

At LogRhythm, we’re constantly looking for ways to make the life of a security analyst easier and that is why we are always listening to our customers to prioritize the features that matter. With this LogRhythm NDR release, we enhanced…

Read More

See what we've been working on...

See how we're delivering on promises to better serve our customers