General

LogRhythm Strengthens Commitment to Cybersecurity in the Kingdom of Saudi Arabia, Safeguarding National Digital Infrastructure Growth

LogRhythm launches its new regional HQ for India, the Middle East, Turkey, and Africa in Riyadh at Blackhat MEA 2023 to support Saudi Vision 2030 and secure the region’s digital future    Riyadh, the Kingdom of Saudi Arabia, 14th November…

Read More

LogRhythm Partners with Qatari Diar to Secure Digital Transformation in the Real Estate Sector in the Middle East

Qatari Diar deploys LogRhythm SIEM to deliver local and global innovation in real estate development with a secure foundation for digital growth    Doha, Qatar, 24th October 2023 —LogRhythm, the company helping security teams stop breaches by turning disconnected data…

Read More

Qatari Diar Eliminates IT Visibility Gaps to Deliver Transformative Real Estate with LogRhythm SIEM

Qatari Diar was established in 2005 by the Qatar Investment Authority, the sovereign wealth fund of the State of Qatar. Today, it is one of the world’s most trusted and respected real estate companies recognized for its commitment to quality,…

Read More
LogRhythm Unveils Major Advancements to Cloud-Native SIEM Platform, LogRhythm Axon

LogRhythm Unveils Major Advancements to Cloud-Native SIEM Platform, LogRhythm Axon

New platform automations and optimizations empower SOC team to more efficiently mitigate threats and reduce the skills gap  LogRhythm, the company helping security teams stop breaches by turning disconnected data and signals into trustworthy insights, today announced its 6th consecutive…

Read More
long exposure photograph of busy city street at night

Protecting Critical Infrastructure From Ransomware with LogRhythm NDR

A European-based organization in the transportation industry needed a way to protect its data with a solution that could mitigate sophisticated threats and move beyond basic threat detection capabilities. It required a holistic solution that could continuously monitor and analyze…

Read More

How Water Utilities can Boost Their Cybersecurity Resilience

Around the world, water utilities are fighting an increasing battle against a rapidly evolving foe. Cybercriminals are targeting supply infrastructure intent on causing disruption, confusion, and losses. Tactics can include shutting down supply to consumers or tainting water with additives…

Read More

Ransomware: How to Defend Against a Four-Decade Old Foe

The first documented attack may have occurred back in the late 1980s, yet ransomware is still topping the list of cyberthreats faced by both organisations and individuals today. An ever-evolving form of malware, ransomware is designed to encrypt data files…

Read More

Ransomware: How to Detect Attacks Before They Become Catastrophic

Register for our free webinar to gain crucial insight from seasoned experts on ransomware anatomy, warning signs, proactive defense strategy, and swift incident response technique. Don’t risk your data and digital security!

Read More

Here’s What Zero Trust Really Means

Zero trust functions on the main principle that everything is a threat that must be verified before gaining access to anything in your company’s databases. Watch this on-demand webinar to learn about zero trust and how to quickly implement your strategy!

Read More

Achieving a Robust Zero Trust Environment

The concept of a Zero Trust infrastructure is now broadly understood across most industry sectors, but what’s less clear is the path organisations need to follow to get there. Rather than simply being a case of purchasing and deploying a…

Read More

To lure global talent, Indonesia’s new Golden Visa must go beyond long-term stay permits

[JAKARTA] In the global hunt for talent, Indonesia is beginning to recognise that size alone is not enough to attract the world’s best to its shores. Indeed, over the past few years, the country has sought to limit the inflow…

Read More

Singapore’s healthcare reforms hinge on public trust in the data sharing ecosystem

With Singapore facing significant long-term pressures on its healthcare system driven by an increasingly ageing population, Health Minister Ong Ye Kung recently unveiled an ambitious vision for long-term healthcare reform in Parliament earlier this year, led by the Healthier SG…

Read More

LogRhythm Hosts First Asia-Pacific Partner Tech University, Empowering Participants to Deliver Effectively

Close to 100 participants across over 30 partner organisations in the region participated in the two-day event. SINGAPORE, August 1, 2023— LogRhythm, the company helping security teams stop breaches by turning disconnected data and signals into trustworthy insights, today announced…

Read More

Defence is the best offence: Why startups should prioritise cybersecurity even when scaling their business

The past years have seen an unprecedented migration of transactions and interactions from offline to digital-first platforms, fueling the rise of a new wave of startups. In this landscape, startups have become especially vulnerable to cyber-attacks. As they expand their…

Read More

Infoline launches LogRhythm-Powered SOC to Deliver Crucial Cybersecurity Services in Malaysia

SINGAPORE, July 25, 2023— LogRhythm, the company helping security teams stop breaches by turning disconnected data and signals into trustworthy insights, today announced their partnership with Infoline Tec Group Berhad, an established IT infrastructure and cybersecurity service provider. With this…

Read More

Guide to Building a Cybersecurity Incident Response Plan [Part 2]

Having a cybersecurity incident response plan is essential for any organization that wants to be prepared for a security incident. By being prepared for an incident, your organisation is able to align and respond quickly if and when one happens.…

Read More

Guide to Building a Cybersecurity Incident Response Plan [Part 1]

Cybersecurity incidents are a fact of life in today’s digital world. Every day, organizations of all sizes are targeted by hackers and other cyber criminals. In 2022, there were over 600 billion cyberattacks worldwide, and the number is only expected…

Read More

User v Consumption-based Charging: What’s Best for Australia’s Public Sector?

With one eye on the growing number of cybersecurity threats and the other on budgetary constraints, Australia’s public-sector organisations are grappling with how best to secure their IT infrastructures, writes Michael Bovalino. The challenge is made more acute by a…

Read More