LogRhythm Strengthens Commitment to Cybersecurity in the Kingdom of Saudi Arabia, Safeguarding National Digital Infrastructure Growth
LogRhythm launches its new regional HQ for India, the Middle East, Turkey, and Africa in Riyadh at Blackhat MEA 2023 to support Saudi Vision 2030 and secure the region’s digital future Riyadh, the Kingdom of Saudi Arabia, 14th November…
Read More
November 14, 2023
LogRhythm Partners with Qatari Diar to Secure Digital Transformation in the Real Estate Sector in the Middle East
Qatari Diar deploys LogRhythm SIEM to deliver local and global innovation in real estate development with a secure foundation for digital growth Doha, Qatar, 24th October 2023 —LogRhythm, the company helping security teams stop breaches by turning disconnected data…
Read More
October 24, 2023
Qatari Diar Eliminates IT Visibility Gaps to Deliver Transformative Real Estate with LogRhythm SIEM
Qatari Diar was established in 2005 by the Qatar Investment Authority, the sovereign wealth fund of the State of Qatar. Today, it is one of the world’s most trusted and respected real estate companies recognized for its commitment to quality,…
Read More
October 15, 2023
LogRhythm Unveils Major Advancements to Cloud-Native SIEM Platform, LogRhythm Axon
New platform automations and optimizations empower SOC team to more efficiently mitigate threats and reduce the skills gap LogRhythm, the company helping security teams stop breaches by turning disconnected data and signals into trustworthy insights, today announced its 6th consecutive…
Read More
October 2, 2023
Protecting Critical Infrastructure From Ransomware with LogRhythm NDR
A European-based organization in the transportation industry needed a way to protect its data with a solution that could mitigate sophisticated threats and move beyond basic threat detection capabilities. It required a holistic solution that could continuously monitor and analyze…
Read More
September 27, 2023
How Water Utilities can Boost Their Cybersecurity Resilience
Around the world, water utilities are fighting an increasing battle against a rapidly evolving foe. Cybercriminals are targeting supply infrastructure intent on causing disruption, confusion, and losses. Tactics can include shutting down supply to consumers or tainting water with additives…
Read More
September 11, 2023
Ransomware: How to Defend Against a Four-Decade Old Foe
The first documented attack may have occurred back in the late 1980s, yet ransomware is still topping the list of cyberthreats faced by both organisations and individuals today. An ever-evolving form of malware, ransomware is designed to encrypt data files…
Read More
September 5, 2023
Ransomware: How to Detect Attacks Before They Become Catastrophic
Register for our free webinar to gain crucial insight from seasoned experts on ransomware anatomy, warning signs, proactive defense strategy, and swift incident response technique. Don’t risk your data and digital security!
Read More
September 1, 2023
Here’s What Zero Trust Really Means
Zero trust functions on the main principle that everything is a threat that must be verified before gaining access to anything in your company’s databases. Watch this on-demand webinar to learn about zero trust and how to quickly implement your strategy!
Read More
August 25, 2023
Achieving a Robust Zero Trust Environment
The concept of a Zero Trust infrastructure is now broadly understood across most industry sectors, but what’s less clear is the path organisations need to follow to get there. Rather than simply being a case of purchasing and deploying a…
Read More
August 18, 2023
To lure global talent, Indonesia’s new Golden Visa must go beyond long-term stay permits
[JAKARTA] In the global hunt for talent, Indonesia is beginning to recognise that size alone is not enough to attract the world’s best to its shores. Indeed, over the past few years, the country has sought to limit the inflow…
Read More
August 5, 2023
Singapore’s healthcare reforms hinge on public trust in the data sharing ecosystem
With Singapore facing significant long-term pressures on its healthcare system driven by an increasingly ageing population, Health Minister Ong Ye Kung recently unveiled an ambitious vision for long-term healthcare reform in Parliament earlier this year, led by the Healthier SG…
Read More
August 3, 2023
LogRhythm Hosts First Asia-Pacific Partner Tech University, Empowering Participants to Deliver Effectively
Close to 100 participants across over 30 partner organisations in the region participated in the two-day event. SINGAPORE, August 1, 2023— LogRhythm, the company helping security teams stop breaches by turning disconnected data and signals into trustworthy insights, today announced…
Read More
August 1, 2023
Defence is the best offence: Why startups should prioritise cybersecurity even when scaling their business
The past years have seen an unprecedented migration of transactions and interactions from offline to digital-first platforms, fueling the rise of a new wave of startups. In this landscape, startups have become especially vulnerable to cyber-attacks. As they expand their…
Read More
July 28, 2023
Infoline launches LogRhythm-Powered SOC to Deliver Crucial Cybersecurity Services in Malaysia
SINGAPORE, July 25, 2023— LogRhythm, the company helping security teams stop breaches by turning disconnected data and signals into trustworthy insights, today announced their partnership with Infoline Tec Group Berhad, an established IT infrastructure and cybersecurity service provider. With this…
Read More
July 24, 2023
Guide to Building a Cybersecurity Incident Response Plan [Part 2]
Posted by: Private: Mirabelle Sim
Having a cybersecurity incident response plan is essential for any organization that wants to be prepared for a security incident. By being prepared for an incident, your organisation is able to align and respond quickly if and when one happens.…
Read More
July 17, 2023
Guide to Building a Cybersecurity Incident Response Plan [Part 1]
Posted by: Private: Mirabelle Sim
Cybersecurity incidents are a fact of life in today’s digital world. Every day, organizations of all sizes are targeted by hackers and other cyber criminals. In 2022, there were over 600 billion cyberattacks worldwide, and the number is only expected…
Read More
July 10, 2023
User v Consumption-based Charging: What’s Best for Australia’s Public Sector?
With one eye on the growing number of cybersecurity threats and the other on budgetary constraints, Australia’s public-sector organisations are grappling with how best to secure their IT infrastructures, writes Michael Bovalino. The challenge is made more acute by a…
Read More
July 5, 2023