General

TechRepublic Logo

One year removed from the Colonial Pipeline attack, what have we learned?

With May 7 marking the one-year anniversary of the Colonial Pipeline ransomware attack, James Carder shares his perspective on what enterprises should look out for to prevent more attacks such as this.

Read More
Exploring the 3 Major Threat Detection Methods

Exploring the 3 Major Threat Detection Methods: Signature, Behavior, Machine Learning

I kid you not that more than once, it’s been asked, “Which event IDs indicate a security intrusion so I can set up an alert in my SIEM?” If it were only so easy. How do you effectively detect attacker…

Read More

Get to know LogRhythm’s Advanced Analytics UEBA | Webinar

Read More
Log4Shell Vulnerability

Impact and Insights on Log4Shell Vulnerability

Read More
Mohan Raj

Attacks on IoT: The Call to Combat Rising Cyberthreats in the Telco Space

Attacks on IoT: In today’s cyberthreat landscape, threat actors are drawn to organizations that operate within critical infrastructure sectors, including telecommunications (telco), due to the potential to cause significant damage and disturbance to critical processes that benefit ordinary people and…

Read More
Security Middle East and Africa

Cloud Security Needs to Become a Higher Priority

Mazen Dohaji, Vice President, iMETA, LogRhythm in conversation with Security Middle East and Africa talks about the evolving cybersecurity landscape and explained that with the cloud adoption gaining momentum, cloud security needs to be priority for the organizations in the region.

Read More
Michael Bovalino, Country Manager, ANZ

Five steps to protect against and recover from ransomware attacks

Ransomware attacks are on the rise and organisations of all sizes are falling victim. The attacks involve cybercriminals infecting a target’s IT infrastructure, encrypting vital data, and then demanding a ransom payment in exchange for the keys. Right now, they…

Read More
In the News

In the News [Part 1]

Read More
Joanne Wong, VP of International Marketing

Staying on top of the ever-evolving malware cyber threat

Malware first appeared in the 1980s, and some forty years later, malware remains a thorn in the side of IT security teams across the world. Joanne Wong, Vice President International Marketing APAC and EMEA at LogRhythm, outlines what IT teams…

Read More
The Evolution and Life of a CISO

The Evolution and Life of a CISO

Read More

LogRhythm shakes up executive team with new hires, promotions

LogRhythm has hired or promoted a handful of new executives to its product organization, including Chris O’Malley, the company’s new CEO.

Read More
Michael Bovalino, Country Manager, ANZ

The benefits of modernising your security operations centre

One of the largest is maintaining effective security for workforces that are still predominantly home-based. This puts them outside the protection of the corporate firewall and exposes them to greater levels of risk. When you add increasing threats posed by…

Read More

LogRhythm Continues Momentum by Expanding Executive and Product Teams

New CEO Chris O’Malley drives focus on product innovation and strengthens commitment to customers LogRhythm, the company helping busy and lean security operations teams save the day, today announced the hiring of key executives and the expansion of its product…

Read More

How Much is Enough? A Different Cybersecurity Risk Management Approach

Historically, the fear of cyberthreats put organizations and their IT departments on the defense. So much so they still strive to design security plans that try to protect every part of their infrastructure — data centers, assets, networks — everything.…

Read More
Continuity Central logo

Machine learning in cyber security: a structured approach

Machine learning (ML) and artificial intelligence (AI) have become frequent buzzwords in the cyber security space. Security teams have an urgent need for more automated methods for detecting threats and malicious user activity and ML offers a better future. LogRhythm…

Read More
Toolbox Security Logo

Top 10 SIEM Solutions in 2022

LogRhythm is included in Toolbox’s top 10 SIEM solutions for 2022. Read how our SIEM solution stacks up against the competition.

Read More

Leading Bangladeshi bank achieves new heights of information security with LogRhythm SIEM

As one of the largest banks in Bangladesh, BRAC Bank is committed to building a financial ecosystem that contributes to a more democratic and poverty-free country. They serve more than two million retail, corporate, and SME business customers through a…

Read More
A Look at Cyberwarfare Actions and Detection Using HermeticWiper Malware as the Example

A Look at Cyberwarfare Actions and Detection Using HermeticWiper Malware as the Example | Webinar

Read More