LogRhythm Blog

Check out the latest security tips and tricks, news, and insights and join in the conversation

With Great Power Comes Great Responsibility

Following the UK Conservative Party Conference this week, many headlines honed in on the government’s plan to create a battalion of cyber reserves to protect the country from online attacks. There is an ongoing cyber security skills shortage in the…

Read More

Understanding a Basic Web Attack Using Log Data

A colleague of mine recently asked me to take a look at some logs he was investigating. The LogRhythm Web Application Defense Module had initially keyed him into the suspicious behavior and he was now examining the raw logs to…

Read More

Federal Compliance Update FedRAMP

The U.S. Federal Government has expanded their service offerings by outsourcing infrastructure to cloud-based services providers. The use of cloud-based services comes with inherent risk. However, the Federal Office of Management and Budget (OMB) has been working diligently over the…

Read More

Using Logger to Send File Data to SYSLOGD

If you find yourself needing to have the contents of an ASCII text file written to syslog, then consider the use of the logger command. This comes with most Unix distributions and has also been ported to the Windows platform.…

Read More

Controlling Access to Windows 2008 Event Logs

On systems running 2003, any user account needing the ability to read other system’s event logs required that the registry to be edited and some SDDL (Security Descriptor Definition Language) entries be made on all respective remote systems. In 2008 it has…

Read More

See what we've been working on...

See how we're delivering on promises to better serve our customers