Priorities in Australia’s IT Sector for the next Government (Part 5)
In this, the fifth instalment in our special series on the state of the IT industry in Australia, we speak with Michael Bovalino, ANZ Country Manager, LogRhythm to get his thoughts on “What our next government needs to do to…
Read More
May 19, 2022
Let’s Talk: Business experts underline key issues ahead of the 2022 elections
Michael Bovalino, ANZ Country Manager, LogRhythm Michael Bovalino, ANZ Country Manager, LogRhythm “Organisations around the world are investing heavily to take advantage of the significant economic and social opportunities that a digital economy can bring. “Australian business ongoing success depends…
Read More
May 19, 2022
LogRhythm Partners with REAL security to Enable Enterprises in the Adriatic Region to Detect and Respond to Cyberthreats
Posted by: Laura Halls
The partnership expands LogRhythm’s footprint into south-east Europe and provides REAL security with world-leading security operations capabilities. Maribor, Slovenia 19 May 2022 — LogRhythm, the company helping busy and lean security operations teams save the day, has launched a strategic…
Read More
May 19, 2022
Scalable, Automated Network Threat Detection in Action
Read More
May 13, 2022
LogRhythm’s partnership with Salvation Army Australia wins Best SIEM – Computer Software at the SBR Technology Excellence Awards 2022
Award winning NextGen SIEM platform was crucial in empowering Salvation Army Australia achieve game-changing cybersecurity posture SINGAPORE – 12 May 2022 – LogRhythm, the company that helps busy and lean security operations teams save the day, has won the award…
Read More
May 11, 2022
Modern Cyber Threats Require A Modern Security Operations Center: Is Your Business Prepared?
The never-ending barrage of alerts and massive amounts of log data to sift through daily leaves many security teams stretched too thin to identify actual threats promptly. That’s why organizations must prioritize modernizing their security operations center (SOC).
Read More
May 10, 2022
Securing U.S. Cleared Defense Contractors Against Russian State-Sponsored Attacks
State-sponsored attacks frequently target numerous U.S. Cleared Defense Contractor (CDC) networks to obtain critical information and other sensitive assets related to the U.S. government’s national security and defense capabilities. For state-sponsored threat actors, gaining access to highly classified information allows…
Read More
May 9, 2022
Training employees to identify a spear phishing attack
Nothing Personal: Training Employees to Identify a Spear Phishing Attack. Phishing attacks began years ago as simple spam, designed to trick recipients into visiting sites and becoming customers. In the meantime, they have morphed into a worldwide criminal industry. In…
Read More
May 9, 2022
Cybersecurity in the IoT World
Cybersecurity in the IoT World: How Telcos Can Secure Critical Infrastructure Against New Threats Over the last year, threat actors have launched a series of major attacks on critical infrastructure, an industry fast becoming one of the most targeted by…
Read More
May 9, 2022
One year removed from the Colonial Pipeline attack, what have we learned?
With May 7 marking the one-year anniversary of the Colonial Pipeline ransomware attack, James Carder shares his perspective on what enterprises should look out for to prevent more attacks such as this.
Read More
May 6, 2022
Exploring the 3 Major Threat Detection Methods: Signature, Behavior, Machine Learning
I kid you not that more than once, it’s been asked, “Which event IDs indicate a security intrusion so I can set up an alert in my SIEM?” If it were only so easy. How do you effectively detect attacker…
Read More
May 6, 2022
Get to know LogRhythm’s Advanced Analytics UEBA (CloudAI) | Webinar
Read More
April 28, 2022