Customers

Multi-Tenant Deployments

Understanding Multi-Tenant Deployments Within the SIEM Platform

The idea of multi-tenant infrastructure and deployments is not new in the cybersecurity landscape. For years, Cisco and Palo Alto firewalls and Citrix and F5 load balancers have supported the idea of a tenant-based deployment.  The idea of supporting tenants…

Read More

The Modern CISO Panel: Making Security Priorities Business Priorities

Read More
salvos

Salvation Army Australia achieves game-changing cybersecurity with LogRhythm

As the Salvation Army’s presence in Australia has grown during recent years, the organization has become increasingly reliant on its core IT systems. Used for everything from resource planning and budgeting to record keeping and communication with clients, the infrastructure…

Read More
Person on lap top hunting for threats

Improving Threat Detection Using LogRhythm SmartResponse with Lists to Monitor IOCs

As a security professional, you know all too well the need to continually improve your threat detection techniques and skill set. With today’s expanding attack surface and hackers becoming more sophisticated in their infiltration methods, building a stronger defense is…

Read More
Dan Ney Headshot

LogRhythm Champions Profile: Dan Ney

The LogRhythm Champions Network is an exclusive community of LogRhythm’s most passionate and strategic customers. This elite group of customer leaders in the InfoSec community are experts in all things LogRhythm. The LogRhythm Champions Network works to recognize these leaders for their…

Read More

Introducing Student LogWars — A LogRhythm EDU Partnership Program

In the cybersecurity industry, one of the biggest problems facing recent graduates and employers is the lack of real-world experience from education. To address these challenges, LogRhythm is excited to announce a new facet of our EDU Partnership Program, Student…

Read More
Steve Flannery Headshot

LogRhythm Champions Profile: Steve Flannery

The LogRhythm Champions Network is an exclusive community of LogRhythm’s most passionate and strategic customers. This elite group of customer leaders in the InfoSec community are experts in all things LogRhythm. The LogRhythm Champions Network works to recognize these leaders for…

Read More
Seth Shestack Headshot

LogRhythm Champions Profile: Seth Shestack

The LogRhythm Champions Network is an exclusive community of LogRhythm’s most passionate and strategic customers. This elite group of customer leaders in the InfoSec community are experts in all things LogRhythm. The LogRhythm Champions Network works to recognize these leaders for…

Read More
LogRhythm and Netskope integration for blacklisting URLs

Automate URL and File Blacklisting with Netskope and LogRhythm

While many organizations focus on outside threats, network security shouldn’t be neglected. Having greater visibility into the websites people are searching and the files they are downloading in your network should be a priority. To strengthen your network visibility, LogRhythm…

Read More
Kevin Merolla

LogRhythm Champions Profile: Kevin Merolla

The LogRhythm Champions Network is an exclusive community of LogRhythm’s most passionate and strategic customers.  This elite group of customers leaders in the InfoSec community and are experts in all things LogRhythm. The LogRhythm Champions Network works to recognize these…

Read More
Mac Laptop

How to Audit and Test for Sudo’s CVE-2021-3156 with LogRhythm

TL/DR Qualys has reported that Sudo, before 1.9.4p2, has a heap-based buffer overflow vulnerability that allows privileged escalation to root via “sudoedit -s” and a command-line argument that ends with a single backslash character. Detecting a successful exploit of the…

Read More
Empty office

Code42 and LogRhythm Partner to Protect Against Insider Threats

As remote work has become the norm for many enterprises, organizations are struggling with the troubling reality of rising insider threats. Whether the results are from careless or negligent employees or malicious insiders, it’s crucial to arm your organization with…

Read More