LogRhythm Deploy AI to Defeat Cyber Attacks
LogRhythm today introduced CloudAI, a technology designed to help LogRhythm customers across the globe avoid damaging cyber incidents such as high-profile data breaches. CloudAI is an advanced cloud-based security analytics offering…
Read MoreOctober 10, 2017
Automate Phishing Detection and Response with LogRhythm Phishing Intelligence Engine (PIE)
Modern cybercriminals frequently turn to the phishing email as a means of gaining access to a victim’s network. Phishing campaigns are among the most common and damaging cyberattacks. Despite how common and successful phishing attacks are, often organizations and their employees…
Read MoreSeptember 28, 2017
Ransomware Numbers Continue to Look Abysmal
Ransomware is one of the fastest-growing concerns among IT pros, according to several studies out this week…
Read MoreSeptember 28, 2017
Moving UEBA Beyond the Ground Floor
Insider threats, administrator abuse, and compromised accounts are among the most damaging and difficult to detect threats. User and entity-based analytics (UEBA) solutions are making it possible to detect these advanced threats by employing artificial intelligence (AI) and machine learning.…
Read MoreSeptember 27, 2017
Increasing SIEM Visibility with Microsoft’s Azure Log Integration
As more IT resources are deployed in the cloud, ensuring you have security oriented cloud monitoring is critical for protecting your organization. In this Ultimate Windows Security on-demand webinar, explore how Microsoft’s AzLog can help you shrink blind spots by…
Read MoreSeptember 27, 2017
7 SIEM Situations That Can Sack Security Teams
SIEMs are considered an important tool for incident response, yet a large swath of users find seven major problems when working with SIEMs…
Read MoreSeptember 27, 2017
At LogRhythm, people ride inner tubes to work — and help clients fight cyberattacks
Boulder-based LogRhythm is on a roll. Since its 2003 founding, the company has melded multiple technologies into a user-friendly platform that detects and responds to cyber threats and attacks…
Read MoreSeptember 25, 2017
The Dark Overlord cybergang threatens kids in its latest attack
A cyber gang calling itself The Dark Overlord Solution late last week sent an unusually threatening ransom note to the Columbia Falls school district forcing officials to shutter its schools to ensure the safety of the students…
Read MoreSeptember 21, 2017
How did the Equifax breach happen? Here are some answers and some questions.
Nearly half of all Americans are affected by a cyber security breach at Equifax, one of the nation’s three major credit-reporting agencies. Here’s how to avoid being a victim…
Read MoreSeptember 14, 2017
Impact of the Modernizing Government Technology Act
Revision 5 of NIST 800 has been delayed to late 2017 or early 2018. As a result, organizations have an opportunity to mature their security operations beyond basic compliance oriented processes and systems. In this webinar, Timothy Young, director of…
Read MoreSeptember 13, 2017
Hope is not a security strategy – which is why AI is no longer optional
Good information-security personnel have become harder and harder to find – and that is making it harder to mount an effective defence against ballooning volumes of security alerts…
Read MoreSeptember 8, 2017
Clearing up confusion on the Equifax data breach, no thanks to Equifax
What the hack happened is unclear, but best to live like your personal data was stolen…
Read MoreSeptember 8, 2017
Why this security vet tapped a physicist to get LogRhythm off the ground
During the dot-com boom of the 90s, Chris Petersen could see that increased demand for cybersecurity was on the horizon. So, too, was the need for security analysts to detect and respond to threats rapidly…
Read MoreAugust 24, 2017
The importance of effective incident response: The HBO breach expands
The hackers behind the recent breach at HBO have posted additional stolen data online, including Game of Thrones script summaries and several emails from an HBO executive’s inbox, according to the Hollywood Reporter…
Read MoreAugust 9, 2017
How can AI help us fight cyber crime?
How better to fight cybercrime than with today’s top cyber technology, AI; fighting fire with fire. Ross Brewer, Vice President and Managing Director at LogRhythm explains the ins and outs of artificial intelligence…
Read MoreAugust 8, 2017
£17 million fines for CNI companies under proposed EU SNIS plans
Under an (NIS) directive being adopted by the UK, CNI providers will face fines of £17 million or up to four percent of annual turnover if they fail to protect critical infrastructure from loss of services due to cyber-attacks…
Read MoreAugust 8, 2017
HBO breach accomplished with hard work by hacker, poor security practices by victim
Cybersecurity executives are speculating the HBO hack by “Mr. Smith” was the result of the intruder putting in a tremendous amount of effort to infiltrate the entertainment giant…
Read MoreAugust 8, 2017
HBO hacked: Game of Thrones, Ballers, Room 104 content involved
Entertainment Weekly reported that hackers claimed to have taken 1.5TB of data from HBO…
Read MoreAugust 1, 2017