One year removed from the Colonial Pipeline attack, what have we learned?
With May 7 marking the one-year anniversary of the Colonial Pipeline ransomware attack, James Carder shares his perspective on what enterprises should look out for to prevent more attacks such as this.
Read MoreMay 6, 2022
Exploring the 3 Major Threat Detection Methods: Signature, Behavior, Machine Learning
I kid you not that more than once, it’s been asked, “Which event IDs indicate a security intrusion so I can set up an alert in my SIEM?” If it were only so easy. How do you effectively detect attacker…
Read MoreMay 6, 2022
Get to know LogRhythm’s Advanced Analytics UEBA | Webinar
Read MoreApril 28, 2022
Impact and Insights on Log4Shell Vulnerability
Read MoreApril 28, 2022
Attacks on IoT: The Call to Combat Rising Cyberthreats in the Telco Space
Attacks on IoT: In today’s cyberthreat landscape, threat actors are drawn to organizations that operate within critical infrastructure sectors, including telecommunications (telco), due to the potential to cause significant damage and disturbance to critical processes that benefit ordinary people and…
Read MoreApril 28, 2022
Cloud Security Needs to Become a Higher Priority
Mazen Dohaji, Vice President, iMETA, LogRhythm in conversation with Security Middle East and Africa talks about the evolving cybersecurity landscape and explained that with the cloud adoption gaining momentum, cloud security needs to be priority for the organizations in the region.
Read MoreApril 28, 2022
Five steps to protect against and recover from ransomware attacks
Ransomware attacks are on the rise and organisations of all sizes are falling victim. The attacks involve cybercriminals infecting a target’s IT infrastructure, encrypting vital data, and then demanding a ransom payment in exchange for the keys. Right now, they…
Read MoreApril 28, 2022
Staying on top of the ever-evolving malware cyber threat
Malware first appeared in the 1980s, and some forty years later, malware remains a thorn in the side of IT security teams across the world. Joanne Wong, Vice President International Marketing APAC and EMEA at LogRhythm, outlines what IT teams…
Read MoreApril 20, 2022
The Evolution and Life of a CISO
Read MoreApril 13, 2022
LogRhythm shakes up executive team with new hires, promotions
LogRhythm has hired or promoted a handful of new executives to its product organization, including Chris O’Malley, the company’s new CEO.
Read MoreApril 8, 2022
The benefits of modernising your security operations centre
One of the largest is maintaining effective security for workforces that are still predominantly home-based. This puts them outside the protection of the corporate firewall and exposes them to greater levels of risk. When you add increasing threats posed by…
Read MoreApril 7, 2022
LogRhythm Continues Momentum by Expanding Executive and Product Teams
New CEO Chris O’Malley drives focus on product innovation and strengthens commitment to customers LogRhythm, the company helping busy and lean security operations teams save the day, today announced the hiring of key executives and the expansion of its product…
Read MoreApril 5, 2022
How Much is Enough? A Different Cybersecurity Risk Management Approach
Historically, the fear of cyberthreats put organizations and their IT departments on the defense. So much so they still strive to design security plans that try to protect every part of their infrastructure — data centers, assets, networks — everything.…
Read MoreMarch 31, 2022
Machine learning in cyber security: a structured approach
Machine learning (ML) and artificial intelligence (AI) have become frequent buzzwords in the cyber security space. Security teams have an urgent need for more automated methods for detecting threats and malicious user activity and ML offers a better future. LogRhythm…
Read MoreMarch 25, 2022
Top 10 SIEM Solutions in 2022
LogRhythm is included in Toolbox’s top 10 SIEM solutions for 2022. Read how our SIEM solution stacks up against the competition.
Read MoreMarch 24, 2022
Leading Bangladeshi bank achieves new heights of information security with LogRhythm SIEM
As one of the largest banks in Bangladesh, BRAC Bank is committed to building a financial ecosystem that contributes to a more democratic and poverty-free country. They serve more than two million retail, corporate, and SME business customers through a…
Read MoreMarch 17, 2022
A Look at Cyberwarfare Actions and Detection Using HermeticWiper Malware as the Example | Webinar
Read MoreMarch 17, 2022