General

How to approach a Zero Trust security model for your enterprise

Implementing a Zero Trust model to protect your enterprise’s critical systems could be worth the trouble…

Read More

LogRhythm Wins Approval for Department of Homeland Security’s Cybersecurity Initiative

BOULDER, Colo. — February 6, 2018 — LogRhythm, The Security Intelligence Company, today announced that its industry-leading NextGen Security Information and Event Management (SIEM) and User and Entity Behavior Analytics (UEBA) solutions are now available under the Department of Homeland…

Read More

LogRhythm dips toes into UEBA market to defend against user-based threats

LogRhythm is dipping its toes into the User and Behaviour Analytics (UEBA) market for organisations that aren’t able to replace their existing legacy solutions – and to protect against insider threats, account takeovers, as well as privilege abuse and misuse…

Read More

Nearly half of users still don’t know what ransomware is – but AI promises a workaround

With many users still clueless about the existence of ransomware and companies struggling to change their behaviour, artificial intelligence (AI) is rapidly gaining currency as a solution to user indifference and a driver for more proactive defences in the future…

Read More

LogRhythm Introduces Integrated Solution for GDPR Compliance

LogRhythm’s GDPR Compliance Module streamlines GDPR compliance, enabling customers to better protect personal data and avoid costly fines. BOULDER, Colo. — January 10, 2018 — LogRhythm, The Security Intelligence Company, today announced the release of its General Data Protection Regulation…

Read More

Apple iPhone Chip Vulnerability is the ‘Most Disturbing’ Security Issue in Decades

Apple has admitted that every iPhone and Mac computer is affected by the Meltdown and Spectre chip vulnerabilities, which security researchers say…

Read More

Microchip Meltdown as Experts Uncover Serious Flaws

A serious flaw reportedly present in all Intel’s CPUs made in the past 10 years is leaving devices vulnerable to hackers, security experts have warned…

Read More

2017: A watershed year for cybersecurity

Though we will come to characterize 2017 with many words and many concepts over the coming months, this year will probably be remembered as the year when warfare came to the cyber sphere in earnest…

Read More

Security Pros Waste 40 Hours Per Month Thanks to Inefficient Systems

The majority of IT decision-makers think the average cybersecurity professional wastes as much as 10 hours a week due to inadequate software…

Read More

New Study Finds Security Professionals are Wasting 40 Hours Per Month Due to Inefficient Systems

BOULDER, Colo. — December 19, 2017 — LogRhythm, The Security Intelligence Company, today released a new research study that revealed process and software inefficiencies play a major role in slowing down an organization’s ability to detect and respond to cyber…

Read More

LogRhythm Introduces Standalone User and Entity Behavior Analytics Offering

BOULDER, Colo. — December 19, 2017 — LogRhythm, The Security Intelligence Company, today announced it has entered the User and Entity Behavior Analytics (UEBA) market with the introduction of LogRhythm UEBA, an independent analytics product that enhances the security of…

Read More

Optimize Phishing Detection and Response with LogRhythm and Office 365

Today’s hackers often favor the phishing email as their weapon of choice. Phishing attacks are not only common, but are also very difficult to defend against. What if you could detect and mitigate a phishing attack before its intended target…

Read More

LogRhythm Named a Leader in 2017 Gartner Magic Quadrant for Security Information and Event Management (SIEM)

BOULDER, Colo. — December 6, 2017 — LogRhythm, The Security Intelligence Company, today announced that it has, once again, been positioned as a Leader by Gartner, Inc. in the 2017 “Magic Quadrant for Security Information and Event Management” research report.…

Read More

Monitoring Privileged Accounts with Windows Security Log

Hackers have determined a number of ways to harvest privileged account credentials and use them to infiltrate networks. This makes monitoring privileged account usage critical to reducing your organization’s cyber risk. The good news is that Windows provides event ID…

Read More

Cloud AI in the Enterprise: Making the Security Case

In this guest post, Ross Brewer, managing director and vice president for Europe, Middle East and Africa at cybersecurity software supplier LogRhythm, makes the enterprise case for using artificial intelligence (AI) in the fight against cybercrime…

Read More

How to Recognize Malicious DNS with Free Network Monitoring Tools

Domain Name System (DNS) is woven into the fabric of both the internet and corporate intranets. It works so well that you might even forget it exists — until it is used against you. Hackers haven’t forgotten or ignored DNS.…

Read More

Building a Cybersecurity Architecture to Combat Today’s Threats

The cyberattack surface is growing as organizations implement technologies such as the cloud or the internet of things (IoT). As a result, the traditional perimeter defense approach to security is no longer enough to protect your network. In this on-demand…

Read More

LogRhythm Unveils Self-Evolving Cloud-Based Analytics to Enhance its NextGen SIEM NextGen SIEM Platform

BOULDER, Colo. — October 10, 2017 — LogRhythm, The Security Intelligence Company, today introduced CloudAI, a technology designed to help LogRhythm customers across the globe avoid damaging cyber incidents such as high-profile data breaches. CloudAI is an advanced cloud-based security…

Read More