General

Dark Reading

12 Free, Ready-to-Use Security Tools

There’s no excuse for not knowing your exposure. These free tools can help you analyze what your company is up against and point ways to developing a more thorough security program…

Read More

Industry Welcomes NSW Cyber Security Strategy

Representatives of the IT security sector have welcomed the newly announced NSW Government Cyber Security Strategy, and urged other states to follow NSW’s example with their own integrated strategies…

Read More

Defending the Enterprise Using Open-Source Security Tools

One of the common complaints security professionals tend to share is, “I don’t have the budget for that.” But did you know that many of the tools that can solve security problems in your enterprise are free? You don’t have…

Read More

LogRhythm Granted Patent for Technological Strides in Risk-Based Monitoring and Prioritization

U.S. Patent 10,091,217 acknowledges LogRhythm as the creator of data monitoring methods, highlighting the severity of potential threats BOULDER, CO — October 2, 2018 — LogRhythm, The Security Intelligence Company, announced today that the United States Patent and Trademark Office…

Read More

Some Experts Agree that Facebook Security is in Need of Some Serious Work

Facebook security wasn’t something most of us worried about just five years ago. Most users happily went about their Facebook lives and never thought twice about…

Read More

MAS Intensifies Bout Against Cyberthreats for FIs

MAS proposed to make a slew of cybersecurity measures for financial institutions (FIs) into legally binding requirements…

Read More

LogRhythm Named a Leader in Security Analytics by Independent Research Firm

LogRhythm receives highest possible score in 20 of 30 categories, earning a Leader status BOULDER, CO — September 21, 2018 — LogRhythm, The Security Intelligence Company, today announced that Forrester Research, Inc. named it a Leader in The Forrester Wave™:…

Read More

Detecting a Phishing Attack with (PIE)

Challenge Humans are the most vulnerable part of any digital transaction. Ninety-seven percent of people globally are unable to identify a sophisticated phishing email. Unsuspecting users may click on weaponized links or download attachments, unknowingly exposing your organization to risk.…

Read More

Integrating IAM Solutions with SIEM

Security teams are overwhelmed with a high volume of user accounts. That’s why they’re turning to Identity Access Management (IAM) solutions for help. IAM should go beyond enabling consistent identity and Single Sign On (SSO) and instead seamlessly integrate with…

Read More

Online NRIC Generators a ’cause for concern’, Cybersecurity Experts Say

SINGAPORE: While the Government has issued new guidelines against indiscriminate collection of NRIC details, cybersecurity experts have highlighted a different kind of personal data threat…

Read More

No Single Definition of a SOC: The SANS 2018 Survey Part 1

While security operation centers (SOCs) are maturing, staffing and retention issues continue to plague critical SOC support functions. Watch this on-demand webinar to learn how respondents to the SANS 2018 SOC survey are staffing their SOCs. You’ll discover the value…

Read More

Cryptojacking Instances in Australia are on the Rise

One weekend in February, prominent government websites from around the world began triggering alerts in users’ anti-virus. State government…

Read More

Catching Attacks Early in the Kill Chain

Organizations need to detect security events early in the kill chain in order to deflect attackers, says Matthew Winter of LogRhythm…

Read More

Exclusive: How AI and Quantum Computing are Changing Cybersecurity

The advancement of artificial intelligence (AI) and quantum computing technology have brought equal parts excitement and trepidation to the…

Read More

Your Thoughts: Dixons, Reddit and The Breach Boom

Week after week media outlets spout out news about large companies failing to disclose old breaches, suffering current security breaches or refusing to…

Read More

Reddit Suffers a Major Breach

Social media site Reddit has admitted to suffering a data breach stemming from a hack last June but has refused to disclose its scale…

Read More

Understanding Digital Clues Key in Cyber Breaches: LogRhythm Exec

The advancement of artificial intelligence (AI) and quantum computing technology have brought equal parts excitement and trepidation to the…

Read More

LogRhythm Recognized as a 2018 Gartner Peer Insights Customers’ Choice for Security Information and Event Management (SIEM) Software

BOULDER, CO — July 25, 2018 — LogRhythm, the leader in security information and event management (SIEM) solutions, today announced they were named a 2018 Gartner Peer Insights Customers’ Choice for Security Information and Event Management (SIEM) Software. Gartner defines…

Read More