How to approach a Zero Trust security model for your enterprise
Implementing a Zero Trust model to protect your enterprise’s critical systems could be worth the trouble…
Read MoreFebruary 9, 2018
Implementing a Zero Trust model to protect your enterprise’s critical systems could be worth the trouble…
Read MoreFebruary 9, 2018
BOULDER, Colo. — February 6, 2018 — LogRhythm, The Security Intelligence Company, today announced that its industry-leading NextGen Security Information and Event Management (SIEM) and User and Entity Behavior Analytics (UEBA) solutions are now available under the Department of Homeland…
Read MoreFebruary 6, 2018
LogRhythm is dipping its toes into the User and Behaviour Analytics (UEBA) market for organisations that aren’t able to replace their existing legacy solutions – and to protect against insider threats, account takeovers, as well as privilege abuse and misuse…
Read MoreFebruary 5, 2018
With many users still clueless about the existence of ransomware and companies struggling to change their behaviour, artificial intelligence (AI) is rapidly gaining currency as a solution to user indifference and a driver for more proactive defences in the future…
Read MoreFebruary 5, 2018
LogRhythm’s GDPR Compliance Module streamlines GDPR compliance, enabling customers to better protect personal data and avoid costly fines. BOULDER, Colo. — January 10, 2018 — LogRhythm, The Security Intelligence Company, today announced the release of its General Data Protection Regulation…
Read MoreJanuary 10, 2018
Apple has admitted that every iPhone and Mac computer is affected by the Meltdown and Spectre chip vulnerabilities, which security researchers say…
Read MoreJanuary 5, 2018
A serious flaw reportedly present in all Intel’s CPUs made in the past 10 years is leaving devices vulnerable to hackers, security experts have warned…
Read MoreJanuary 5, 2018
Though we will come to characterize 2017 with many words and many concepts over the coming months, this year will probably be remembered as the year when warfare came to the cyber sphere in earnest…
Read MoreDecember 27, 2017
The majority of IT decision-makers think the average cybersecurity professional wastes as much as 10 hours a week due to inadequate software…
Read MoreDecember 20, 2017
BOULDER, Colo. — December 19, 2017 — LogRhythm, The Security Intelligence Company, today released a new research study that revealed process and software inefficiencies play a major role in slowing down an organization’s ability to detect and respond to cyber…
Read MoreDecember 19, 2017
BOULDER, Colo. — December 19, 2017 — LogRhythm, The Security Intelligence Company, today announced it has entered the User and Entity Behavior Analytics (UEBA) market with the introduction of LogRhythm UEBA, an independent analytics product that enhances the security of…
Read MoreDecember 19, 2017
Today’s hackers often favor the phishing email as their weapon of choice. Phishing attacks are not only common, but are also very difficult to defend against. What if you could detect and mitigate a phishing attack before its intended target…
Read MoreDecember 15, 2017
BOULDER, Colo. — December 6, 2017 — LogRhythm, The Security Intelligence Company, today announced that it has, once again, been positioned as a Leader by Gartner, Inc. in the 2017 “Magic Quadrant for Security Information and Event Management” research report.…
Read MoreDecember 6, 2017
Hackers have determined a number of ways to harvest privileged account credentials and use them to infiltrate networks. This makes monitoring privileged account usage critical to reducing your organization’s cyber risk. The good news is that Windows provides event ID…
Read MoreNovember 27, 2017
In this guest post, Ross Brewer, managing director and vice president for Europe, Middle East and Africa at cybersecurity software supplier LogRhythm, makes the enterprise case for using artificial intelligence (AI) in the fight against cybercrime…
Read MoreNovember 17, 2017
Domain Name System (DNS) is woven into the fabric of both the internet and corporate intranets. It works so well that you might even forget it exists — until it is used against you. Hackers haven’t forgotten or ignored DNS.…
Read MoreNovember 8, 2017
The cyberattack surface is growing as organizations implement technologies such as the cloud or the internet of things (IoT). As a result, the traditional perimeter defense approach to security is no longer enough to protect your network. In this on-demand…
Read MoreNovember 7, 2017
BOULDER, Colo. — October 10, 2017 — LogRhythm, The Security Intelligence Company, today introduced CloudAI, a technology designed to help LogRhythm customers across the globe avoid damaging cyber incidents such as high-profile data breaches. CloudAI is an advanced cloud-based security…
Read MoreOctober 10, 2017