Threat Intelligence Platforms and LogRhythm
April 26, 2021
Your analysts are efficient. They are creative problem solvers who prefer to spend their time putting those inventive skills to use rather than expending energy on mundane tasks. For example, logging into an active directory and unlocking a user account…
Read MoreSeptember 28, 2020
Alarms don’t fire when it’s convenient. You could be threat hunting, out to lunch, or even in bed at 4 a.m. when an alarm comes your way. No matter where you are, you’ll need to quickly determine the severity of…
Read MoreOctober 7, 2019
When a threat emerges in your environment, you need to investigate it as soon as possible to keep it from incurring damage. For that to happen, you need to be notified that it exists in the first place. A typical…
Read MoreSeptember 5, 2019
LogRhythm Echo is now available. LogRhythm Echo is a standalone app that simulates incident scenarios for demonstration purposes, allowing you to test security rules, verify embedded content, and perform red team preparedness exercises. Regardless of the size of your team,…
Read MoreJuly 24, 2019
Twice a year, the LogRhythm Research and Development team hosts an internal hackathon to give our engineers an opportunity to work together, share innovative projects, and get awarded for their ideas. During this event, engineers have a few days to…
Read MoreMarch 22, 2019
Big data — it’s all the rage in the technology industry right now, and for good reason. Data holds information that, if analyzed properly, reveal invaluable insights that you can use for just about anything — from streamlining internal processes…
Read MoreDecember 10, 2018
Anytime our team has been involved in a system migration, there has always been someone who claimed the new system was slower than the old one. In a recent case, the team had just completed the migration of a computing…
Read MoreNovember 16, 2018
New to LogRhythm 7.4: Playbooks Feature Set Standard procedures have been a cornerstone of security best practice since their invention. You may call them runbooks, standing procedures, checklists, or playbooks. Either way, you likely have one or more collections of…
Read MoreOctober 29, 2018
When your team detects a threat, rapid qualification and response can mean the difference between quick containment and a breach of critical data. Relying solely on manual processes puts your organization at risk. To reduce response time, you should automate…
Read MoreOctober 2, 2018
As attacks increase in breadth, scope, and complexity, one of the most common vectors that remains is the endpoint. With up to thousands of endpoints to safeguard, it’s imperative to have solutions that seamlessly integrate to provide complete visibility into…
Read MoreAugust 28, 2018
When faced with a bombardment of threats and a severe resource shortage, the best way to keep your organization ahead of a damaging attack is to make the most of what you have. You need your team and tools to…
Read MoreAugust 8, 2018