General

How to shop online safely during Singles' Day sales and stay clear of scammers

How to Shop Online Safely During Singles’ Day Sales and Stay Clear of Scammers

Ms. Joanne Wong, VP of International Markets at LogRhythm, and Mr. Stas Protassov, Co-founder and Technology President of Cyber Protection Company Acronis, offer the tips to shop online safely during Singles’ Day sales and stay clear of scammers.

Read More
Forbes

Addressing Stress In Security Operations Teams

Over the past few years, there has been a growing issue of stress, burnout and other mental health problems among security professionals. It has not been well understood how high the level of stress on security operations teams really is. To quote LogRhythm’s Chief Security Officer, “Working in security can feel like you’re sitting on top of a powder keg that could explode at any time.”

Read More
Baltimore County Schools Forced to Cancel Classes Following Ransomware Attack

Marijuana Growing Social Website GrowDiaries Exposes Data of 3.4M Users

Rusty Carter, Chief Product Officer at LogRhythm, noted that GrowDiaries users are now vulnerable to a number of attacks and threats. “This raises the risk of credential stuffing, which occurs when attackers leverage stolen passwords from one website for use across multiple different places since many people tend to reuse their credentials,” he warned.

Read More
LogRhythm Launches Tools for Rapidly Adopting the Kingdom of Saudi Arabia’s Essential Cybersecurity Controls (ECC)

LogRhythm Launches Tools for Rapidly Adopting the Kingdom of Saudi Arabia’s Essential Cybersecurity Controls (ECC)

LogRhythm has launched reporting capabilities and compliance use cases that make it simple and efficient to comply with the Kingdom of Saudi Arabia’s (KSA) Essential Cybersecurity Controls (ECC). It enables organizations of all kinds to use one-click, out-of-the box automation to meet the minimum cybersecurity requirements for information and technology assets operating within the KSA.

Read More
Phishing, Sniffing & Zoombombing: Cyber Security During COVID-19

Phishing, Sniffing & Zoombombing: Cyber Security During COVID-19

“Universities provide really rich pickings across quite a wide range of actors,” explained Andrew Hollister, head of LogRhythm Labs. “They’re valuable for three reasons. One is they hold an enormous amount of personal data. Secondly, universities are open by their very nature. And finally, universities are heavily engaged in research. This makes universities a target for both cybercriminals doing extortion, as well as state espionage,” he added.

Read More
Take the pressure down! Four ways to lower the stress levels of your cybersecurity team

LogRhythm’s RhythmWorld Breaks Attendance Records with 300% Increase

LogRhythm opened up the event from what used to be strictly a user conference into a broader event with relevance to the security industry at large. “If you truly want to change things in terms of cybersecurity, you have to be the catalyst for change and have resilience and grit. Security professionals must also hone their leadership skills to effectively inspire their team, as building a cybersecurity strategy requires both internal stakeholders’ endorsement and engagement to shape the strategy that is fit for the organization,” said Abid Adam, Group Chief Risk and Compliance Officer, Axiata Group Berhad.

Read More
Man sitting in front of desktop computer

Security Information and Event Management (SIEM) Solutions: Top Success Factors

The promise of Security Information and Event Management (SIEM) solutions is easy to grasp. They tie together your detection and monitoring systems, along with device logs, to give you a clear overview of alerts and security events. Realizing SIEM’s promise…

Read More
Cybersecurity Awareness: A Cross-Functional Roundtable

Cybersecurity Awareness: A Cross-Functional Roundtable

Now is the time to re-examine the state of security awareness so you’re better equipped to facilitate those improvements: what are the biggest gaps in awareness, what tactics can organizations implement to address these gaps, and how will security awareness evolve as the workforce evolves?

Read More
Take the pressure down! Four ways to lower the stress levels of your cybersecurity team

Take the Pressure Down! Four Ways to Lower the Stress Levels of Your Cybersecurity Team

A cyberattack is an existential threat to all companies, which puts the pressure on cybersecurity teams. The pressure continues to increase as more staff work from home and the skills gap continues to exist. Simon Howe, Vice President Asia Pacific Sales, LogRhythm, explains how companies can help ease the pressure on their cybersecurity teams.

Read More
Global Security Mag - The unique Cybersecurity dangers of Black Friday 2020, Logrhythm comments

Blackbaud Under Investigation Following Breach Revelations, LogRhythm Comments

Following a ransomware attack in May, Blackbaud confirmed that threat actors were able to access unencrypted fields intended for bank account details, login credentials and social security numbers belonging to some customers. Andrew Hollister, head of LogRhythm Labs comments “For many breached organisations, the actual intrusion is just the beginning of what can be an extremely long, public and damaging ‘aftermath’.”

Read More
LogRhythm Recognized as 2020 Tech Cares Award Recipient

LogRhythm Recognized as 2020 Tech Cares Award Recipient

LogRhythm announced that it has been named a winner in TrustRadius’ 2020 Tech Cares awards. The awards recognize technology companies that have gone above and beyond to support their clients and communities in 2020 and during the COVID-19 pandemic. LogRhythm was specifically honored for its ongoing COVID-19 relief, as well as its work to protect organizations from increasing cybersecurity attacks and new threats during the pandemic.

Read More

5 Cybersecurity and Threat Trends CISOs Must Watch

No matter the perimeter, IT hygiene remains imperative, said James Carder, CSO at LogRhythm. If businesses were previously bad at configurations, locking systems down, managing privileges and protecting sensitive data, they’ve pushed everything to the cloud and made it internet-accessible.

Read More
Video: 10 Minute IT Jams - Who is LogRhythm?

Video: 10 Minute IT Jams – Who is LogRhythm?

In this video, Techday speaks with LogRhythm VP of sales for Asia Pacific Simon Howe, who discusses the company’s primary offerings and services, what products the company is focused on for the future, and the infrastructure it has in the A/NZ market.

Read More
LogRhythm’s RhythmWorld Breaks Attendance Records with 300% Increase

LogRhythm’s RhythmWorld Breaks Attendance Records with 300% Increase

LogRhythm announced record-breaking attendance at its 2020 RhythmWorld Security Conference, with more than a 300 percent increase in attendance from the previous year. The virtual conference provided customers, partners and peers with the opportunity to engage in discussion around key topics related to the cybersecurity industry, career growth and maximizing use of the LogRhythm NextGen SIEM Platform.

Read More
SC Media

B&N Cyberattack Calls Into Question the Retailer’s Network Segmentation Practices

An apparent ransomware infection at Barnes & Noble impacted the retailer’s corporate systems and disabled in-store point-of-sale terminals. James Carder, CSO at LogRhythm, said “the incident begs the question of why two very different and distinct environments are connected to…

Read More
Protect Your Servers and IT Infrastructure with LogRhythm: A Comprehensive Platform that Streamlines Data Security

Protect Your Servers and IT Infrastructure with LogRhythm: A Comprehensive Platform that Streamlines Data Security

LogRhythm reduced the amount of work required of the company’s IT department, automating many repetitive tasks involved in gathering and interpreting data. Now, it saves the company between $30,000 and $70,000 every year. And that figure doesn’t include the value…

Read More
Digital Anarchist

James Carder, CSO and VP at LogRhythm, discusses “The State of the Security Team: Are Executives the Problem?” Report”

James Carder shared with TechStrong TV the key insights from “The State of the Security Team: Are Executives the Problem?” report, which explores the stressors that plague security teams, especially in the time of COVID-19.

Read More
Repeat Victimisation: The Threat of Double Extortion Ransomware Attacks

Repeat Victimisation: The Threat of Double Extortion Ransomware Attacks

In the last year or so, double extortion attacks have picked up the pace and made headlines, with the operators of Maze ransomware leading the way in utilising them. In the double extortion model, not only do ransomware attackers encrypt…

Read More