General

Michael Bovalino, Country Manager, ANZ

Priorities in Australia’s IT Sector for the next Government (Part 5)

In this, the fifth instalment in our special series on the state of the IT industry in Australia, we speak with Michael Bovalino, ANZ Country Manager, LogRhythm to get his thoughts on “What our next government needs to do to…

Read More
Michael Bovalino, Country Manager, ANZ

Let’s Talk: Business experts underline key issues ahead of the 2022 elections

Michael Bovalino, ANZ Country Manager, LogRhythm Michael Bovalino, ANZ Country Manager, LogRhythm “Organisations around the world are investing heavily to take advantage of the significant economic and social opportunities that a digital economy can bring. “Australian business ongoing success depends…

Read More
REAL security PR image

LogRhythm Partners with REAL security to Enable Enterprises in the Adriatic Region to Detect and Respond to Cyberthreats

The partnership expands LogRhythm’s footprint into south-east Europe and provides REAL security with world-leading security operations capabilities.  Maribor, Slovenia 19 May 2022 — LogRhythm, the company helping busy and lean security operations teams save the day, has launched a strategic…

Read More
Scalable Automated Network Threat Detection in Action

Scalable, Automated Network Threat Detection in Action

Read More

LogRhythm’s partnership with Salvation Army Australia wins Best SIEM – Computer Software at the SBR Technology Excellence Awards 2022

Award winning NextGen SIEM platform was crucial in empowering Salvation Army Australia achieve game-changing cybersecurity posture SINGAPORE – 12 May 2022 – LogRhythm, the company that helps busy and lean security operations teams save the day, has won the award…

Read More
forbes logo

Modern Cyber Threats Require A Modern Security Operations Center: Is Your Business Prepared?

The never-ending barrage of alerts and massive amounts of log data to sift through daily leaves many security teams stretched too thin to identify actual threats promptly. That’s why organizations must prioritize modernizing their security operations center (SOC).

Read More
American Flag on flag pole

Securing U.S. Cleared Defense Contractors Against Russian State-Sponsored Attacks

State-sponsored attacks frequently target numerous U.S. Cleared Defense Contractor (CDC) networks to obtain critical information and other sensitive assets related to the U.S. government’s national security and defense capabilities. For state-sponsored threat actors, gaining access to highly classified information allows…

Read More
Helpnet Security logo

Training employees to identify a spear phishing attack

Nothing Personal: Training Employees to Identify a Spear Phishing Attack. Phishing attacks began years ago as simple spam, designed to trick recipients into visiting sites and becoming customers. In the meantime, they have morphed into a worldwide criminal industry. In…

Read More
The Fast Mode logo

Cybersecurity in the IoT World

Cybersecurity in the IoT World: How Telcos Can Secure Critical Infrastructure Against New Threats Over the last year, threat actors have launched a series of major attacks on critical infrastructure, an industry fast becoming one of the most targeted by…

Read More
TechRepublic Logo

One year removed from the Colonial Pipeline attack, what have we learned?

With May 7 marking the one-year anniversary of the Colonial Pipeline ransomware attack, James Carder shares his perspective on what enterprises should look out for to prevent more attacks such as this.

Read More
Exploring the 3 Major Threat Detection Methods

Exploring the 3 Major Threat Detection Methods: Signature, Behavior, Machine Learning

I kid you not that more than once, it’s been asked, “Which event IDs indicate a security intrusion so I can set up an alert in my SIEM?” If it were only so easy. How do you effectively detect attacker…

Read More
Get to know LogRhythm’s Advanced Analytics UEBA (CloudAI)

Get to know LogRhythm’s Advanced Analytics UEBA (CloudAI) | Webinar

Read More