LogRhythm Labs

How to Sell Your Cybersecurity Strategy to the Board: An Interview with James Carder

Today most boards are well aware that cybersecurity is an important issue. But being able to convince them that your cybersecurity strategy is the right one, establish buy-in, and win their budget allocation is not always an easy task. In this interview, James Carder—LogRhythm CISO—shares his experience with executing a successful cybersecurity presentation to the board.

Read More

Passive Discovery and Exploitation of Open SMB Shares

Server Message Block (SMB) shares are a critical component to most organizations—allowing for a central repository of files and other items that people need to access and share to do their jobs. As a security professional, it is critical that you identify these vulnerabilities within your environment and lock them down.

Read More

Detecting the BlackNurse DDoS Attack with LogRhythm NetMon

The security operations centre (SOC) at Danish telecoms operator TDC recently published a report with regards to an ICMP based DoS/DDoS style of attack. In the spirit of proactive defense, I thought it was a good idea to see how this type of attack would look within LogRhythm NetMon Freemium.

Read More