Living Off The Land Attacks: The Stealthy Threat Lurking In Cyberspace
In the relentless battleground of cybersecurity, threats continue to become more elusive and sophisticated. Among these, threat actors using Living Off the Land (LOTL) techniques have emerged as formidable adversaries, exploiting legitimate system tools and functionalities to compromise networks undetected.
Read MoreMarch 22, 2024
Dataproof Uses LogRhythm’s SOC Services to Deliver End-to-End Cyber Resilience in Africa
Dataproof Communications is a leading IT Services and Consulting Company specializing in cybersecurity operations, best practices, and technologies. Based in Johannesburg, Dataproof’s mission is to provide first-class cybersecurity solutions to its customers across Africa. It delivers its large base of…
Read MoreMarch 20, 2024
Fighting Back Against Cybersecurity Burnout
Posted by: Andrew Hollister
Andrew Hollister, CISO, LogRhythm, explains how addressing burnout to reduce cyber-risk should be treated as seriously as any other business risk and considers how CISOs can put priorities into perspective.
Read MoreMarch 8, 2024
Ransomware Risks in Healthcare: Here’s What You Can Do
The healthcare industry is full of sensitive and private information – lending itself to heightened risk of cyberattacks, more specifically ransomware attacks. In fact, six out of ten healthcare organizations experienced at least one ransomware attack in the last…
Read MoreMarch 7, 2024
Your Guide to Education Cybersecurity Compliance in Malaysia
In the digital age, where sensitive information flows seamlessly through the internet, cybersecurity has become a paramount concern for just about every industry around the globe. Educational institutions are no exception to this. In fact, the Microsoft Global Threat Tool…
Read MoreMarch 7, 2024
LogRhythm’s Sally Vincent on Malicious Botnet Activity
Sally Vincent, senior threat research engineer for LogRhythm, warns that artificial intelligence (AI) is likely to drive a surge in malicious botnet activity that will overwhelm existing cybersecurity defenses.
Read MoreMarch 4, 2024
Eight Cybersecurity Predictions for 2024
While 100% accurately forecasting the future of cybersecurity is but a pipe dream, preparing adequately through well-informed predictions is essential for setting your organization up for success in the new year. Join the following panel of LogRhythm executives and engineers…
Read MoreFebruary 6, 2024
The Football Association Deploys LogRhythm to Bring Greater Cyber Maturity to the Sport Industry
The Football Association (FA), English football’s governing body, was formed in 1863 to oversee, promote and develop English football at all levels, from grassroots through to the professional game. Its core objectives include ensuring that The Emirates FA Cup remains…
Read MoreJanuary 23, 2024
LogRhythm SIEM 7.15: Leverage New Beats and Platform Improvements
Posted by: Ryan Gamboa
Getting data into your security information and event (SIEM) instance is crucial, and LogRhythm is highly focused on making it easy to do that. As part of our latest quarterly product release, LogRhythm SIEM version 7.15 builds on the innovation…
Read MoreJanuary 4, 2024
Remote Desktop Protocol Hijacking – Security Spotlight
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about Remote Desktop Protocol…
Read MoreDecember 5, 2023
LogRhythm Strengthens Commitment to Cybersecurity in the Kingdom of Saudi Arabia, Safeguarding National Digital Infrastructure Growth
LogRhythm launches its new regional HQ for India, the Middle East, Turkey, and Africa in Riyadh at Blackhat MEA 2023 to support Saudi Vision 2030 and secure the region’s digital future Riyadh, the Kingdom of Saudi Arabia, 14th November…
Read MoreNovember 14, 2023
LogRhythm Partners with Qatari Diar to Secure Digital Transformation in the Real Estate Sector in the Middle East
Qatari Diar deploys LogRhythm SIEM to deliver local and global innovation in real estate development with a secure foundation for digital growth Doha, Qatar, 24th October 2023 —LogRhythm, the company helping security teams stop breaches by turning disconnected data…
Read MoreOctober 24, 2023
Qatari Diar Eliminates IT Visibility Gaps to Deliver Transformative Real Estate with LogRhythm SIEM
Qatari Diar was established in 2005 by the Qatar Investment Authority, the sovereign wealth fund of the State of Qatar. Today, it is one of the world’s most trusted and respected real estate companies recognized for its commitment to quality,…
Read MoreOctober 15, 2023
LogRhythm Unveils Major Advancements to Cloud-Native SIEM Platform, LogRhythm Axon
New platform automations and optimizations empower SOC team to more efficiently mitigate threats and reduce the skills gap LogRhythm, the company helping security teams stop breaches by turning disconnected data and signals into trustworthy insights, today announced its 6th consecutive…
Read MoreOctober 2, 2023
Protecting Critical Infrastructure From Ransomware with LogRhythm NDR
A European-based organization in the transportation industry needed a way to protect its data with a solution that could mitigate sophisticated threats and move beyond basic threat detection capabilities. It required a holistic solution that could continuously monitor and analyze…
Read MoreSeptember 27, 2023
How Water Utilities can Boost Their Cybersecurity Resilience
Around the world, water utilities are fighting an increasing battle against a rapidly evolving foe. Cybercriminals are targeting supply infrastructure intent on causing disruption, confusion, and losses. Tactics can include shutting down supply to consumers or tainting water with additives…
Read MoreSeptember 11, 2023
Ransomware: How to Defend Against a Four-Decade Old Foe
The first documented attack may have occurred back in the late 1980s, yet ransomware is still topping the list of cyberthreats faced by both organisations and individuals today. An ever-evolving form of malware, ransomware is designed to encrypt data files…
Read MoreSeptember 5, 2023
Ransomware: How to Detect Attacks Before They Become Catastrophic
Register for our free webinar to gain crucial insight from seasoned experts on ransomware anatomy, warning signs, proactive defense strategy, and swift incident response technique. Don’t risk your data and digital security!
Read MoreSeptember 1, 2023