General

LogRhythm Deploy AI to Defeat Cyber Attacks

LogRhythm today introduced CloudAI, a technology designed to help LogRhythm customers across the globe avoid damaging cyber incidents such as high-profile data breaches. CloudAI is an advanced cloud-based security analytics offering…

Read More

Automate Phishing Detection and Response with LogRhythm Phishing Intelligence Engine (PIE)

Modern cybercriminals frequently turn to the phishing email as a means of gaining access to a victim’s network. Phishing campaigns are among the most common and damaging cyberattacks. Despite how common and successful phishing attacks are, often organizations and their employees…

Read More
Dark Reading

Ransomware Numbers Continue to Look Abysmal

Ransomware is one of the fastest-growing concerns among IT pros, according to several studies out this week…

Read More

Moving UEBA Beyond the Ground Floor

Insider threats, administrator abuse, and compromised accounts are among the most damaging and difficult to detect threats. User and entity-based analytics (UEBA) solutions are making it possible to detect these advanced threats by employing artificial intelligence (AI) and machine learning.…

Read More

Increasing SIEM Visibility with Microsoft’s Azure Log Integration

As more IT resources are deployed in the cloud, ensuring you have security oriented cloud monitoring is critical for protecting your organization. In this Ultimate Windows Security on-demand webinar, explore how Microsoft’s AzLog can help you shrink blind spots by…

Read More
Dark Reading

7 SIEM Situations That Can Sack Security Teams

SIEMs are considered an important tool for incident response, yet a large swath of users find seven major problems when working with SIEMs…

Read More

At LogRhythm, people ride inner tubes to work — and help clients fight cyberattacks

Boulder-based LogRhythm is on a roll. Since its 2003 founding, the company has melded multiple technologies into a user-friendly platform that detects and responds to cyber threats and attacks…

Read More

The Dark Overlord cybergang threatens kids in its latest attack

A cyber gang calling itself The Dark Overlord Solution late last week sent an unusually threatening ransom note to the Columbia Falls school district forcing officials to shutter its schools to ensure the safety of the students…

Read More

How did the Equifax breach happen? Here are some answers and some questions.

Nearly half of all Americans are affected by a cyber security breach at Equifax, one of the nation’s three major credit-reporting agencies. Here’s how to avoid being a victim…

Read More

Impact of the Modernizing Government Technology Act

Revision 5 of NIST 800 has been delayed to late 2017 or early 2018. As a result, organizations have an opportunity to mature their security operations beyond basic compliance oriented processes and systems. In this webinar, Timothy Young, director of…

Read More

Hope is not a security strategy – which is why AI is no longer optional

Good information-security personnel have become harder and harder to find – and that is making it harder to mount an effective defence against ballooning volumes of security alerts…

Read More

Clearing up confusion on the Equifax data breach, no thanks to Equifax

What the hack happened is unclear, but best to live like your personal data was stolen…

Read More

Why this security vet tapped a physicist to get LogRhythm off the ground

During the dot-com boom of the 90s, Chris Petersen could see that increased demand for cybersecurity was on the horizon. So, too, was the need for security analysts to detect and respond to threats rapidly…

Read More

The importance of effective incident response: The HBO breach expands

The hackers behind the recent breach at HBO have posted additional stolen data online, including Game of Thrones script summaries and several emails from an HBO executive’s inbox, according to the Hollywood Reporter…

Read More

How can AI help us fight cyber crime?

How better to fight cybercrime than with today’s top cyber technology, AI; fighting fire with fire. Ross Brewer, Vice President and Managing Director at LogRhythm explains the ins and outs of artificial intelligence…

Read More

£17 million fines for CNI companies under proposed EU SNIS plans

Under an (NIS) directive being adopted by the UK, CNI providers will face fines of £17 million or up to four percent of annual turnover if they fail to protect critical infrastructure from loss of services due to cyber-attacks…

Read More

HBO breach accomplished with hard work by hacker, poor security practices by victim

Cybersecurity executives are speculating the HBO hack by “Mr. Smith” was the result of the intruder putting in a tremendous amount of effort to infiltrate the entertainment giant…

Read More

HBO hacked: Game of Thrones, Ballers, Room 104 content involved

Entertainment Weekly reported that hackers claimed to have taken 1.5TB of data from HBO…

Read More