General

Employee Service Provider Personal Group Deploys LogRhythm SIEM to Proactively Fight Cybersecurity Threats

Employee Service Provider Personal Group Deploys LogRhythm SIEM to Proactively Fight Cybersecurity Threats

Personal Group gains a streamlined cybersecurity solution to protect mission-critical and personal data against cyberattacks. LogRhythm, the company helping busy and lean security operations teams save the day, has been selected by Personal Group, a leading UK provider of employee…

Read More
Boost Your Threat Hunting with 12 Weeks of Security Spotlights

Boost Your Threat Hunting with 12 Weeks of Security Spotlights

Chief security information officers (CISOs) are on the frontline when it comes to arming their security team against the ever-evolving threat landscape. As part of our commitment to empower security teams to navigate new and emerging cyberthreats, we are delivering…

Read More

askST: How do I know if a new app like Bondee is safe to use?

SINGAPORE – Viral Singapore-based social networking app Bondee was hit with allegations in late January that its users’ credit card information had been leaked, leading to concerns about whether the app is safe to use.

Read More

The Ex(filtrated) Files: How to Reduce Insider Risk to Your Organization

In this webinar, LogRhythm International VP Joanne Wong, explores the origin of the increase in insider attacks, implications these attacks can have on your business, and outlines a holistic plan for organizations to reduce the risk of insider threats.

Read More
Michael Bovalino, Country Manager, ANZ

Preparing your IT security defences for the year ahead

With the cybersecurity threat landscape continuing to evolve, security operations centre (SOC) teams are taking time at the start of the new year to review their strategies and key protective measures. SOC teams understand that effective security can never be…

Read More
Michael Bovalino, Country Manager, ANZ

Why Zero Trust is the Best Security Strategy for 2023

While the concept has been in existence since the early 2000s, many organisations are yet to take the plunge. Instead, they opt to continue with legacy security measures and add additional tools as required. Taking this approach, however, can be…

Read More

Experts’ Take: LogRhythm Cybersecurity Predictions 2023

With organizations embracing remote work and welcoming digitalization, cybersecurity professionals must stay on top of cyberattack trends and prepare for what’s to come to proactively defend their organization. Watch this on-demand webinar to prepare for threats and mitigate risks.

Read More
Industry Today Media Logo

The Future of Supply Chain Attacks

A supply chain is only as good as its weakest link. Break a link and you have broken the pipeline. Companies will fall or will be heavily damaged by that break.

Read More

“Law by Law”: Your Guide to Cybersecurity Compliance in Singapore

As Singapore continues to brand itself as a digital-first country, businesses will also have to adhere to a high cybersecurity standard to inspire confidence in all stakeholders. Ideally, companies should already be in compliance to one of the many cybersecurity…

Read More

LogRhythm helps to mature security operations of Central Banks in Asia Pacific

Central banks play an important role in facilitating economic and financial stability in their respective countries. Broadly speaking, they do this by establishing monetary policy to achieve low and stable inflation, developing the financial system infrastructure, and regulating the financial…

Read More
LogRhythm Partners with SentinelOne to Accelerate Prevention, Detection and Response for Enterprise Environments

LogRhythm Partners with SentinelOne to Accelerate Prevention, Detection and Response for Enterprise Environments

New integration empowers security teams to identify behavioral anomalies, internal and external threats, and to prioritize their responses based on accurate enterprise security intelligence LogRhythm, the company empowering security teams to defend against an ever-evolving threat landscape today announced its…

Read More
Financial Services Organization

Global Fintech Company Deploys LogRhythm’s SIEM to Minimize Cybersecurity Risk and Maximize ROI

A global fintech company needed a way to drive greater efficiency into its cybersecurity posture by achieving measurable time and cost savings. As the threat landscape continues to grow for the financial services industry, it needed to find the right…

Read More
Andrew Hollister, CISO

Cybersecurity Priorities For Water Utilities: Providing a Secure Foundation for Transformation and Automation (Page 92-23)

In this article for Smart Water Magazine, LogRhythm’s CISO Andrew Hollister shares his thoughts on how water utilities can manage and prevent cyberattacks on their systems and networks.

Read More
Help Net Security | Insights into insider threats: Detecting and monitoring abnormal user activity

Insights Into Insider Threats: Detecting and Monitoring Abnormal User Activity

Most organizations focus their threat detection and prevention strategies on external cyberthreats however internal threats are just as dangerous. LogRhythm’s CISO Andrew Hollister shared his thoughts with Help Net Security on how the attack surface for insider threats is expanding…

Read More
Shot of a group of businesspeople talking together over a digital tablet in an office

Building a business case for your SIEM Investment

Chief information security officers (CISOs) are wasting millions of dollars on security products they don’t use – or they are investing in tools that fail to protect their organizations against cyber threats. Almost 75 per cent of attendees at the…

Read More

67% of Companies Admit They Have Lost Deals Because of Low Confidence in Their Security Strategy, According to Research from LogRhythm

Global research finds external stakeholders are increasingly expecting vendors to meet specific security requirements to win and retain business LogRhythm, the company empowering security teams to defend against the ever-evolving threat landscape, today announced the release of its report, “The…

Read More
Three Steps to Translate Threat Reports into Actionable Items Using MITRE ATT&CK®

Security from simplicity: Why complexity is the enemy of security

IT security is complicated. It’s an arms race. Hackers and Chief Information Security Officers (CISOs) are stuck in a never-ending game of whack-a-mole, where vulnerabilities keep popping up that security teams try and fix before they can be exploited by…

Read More

Why Zero Trust Security Matters Now

It’s no longer a question of why you need Zero Trust, but how soon can you adopt the strategy. In this webinar, LogRhythm CISO Andrew Hollister, discusses the importance of Zero Trust and reveals best practices to adopt this security architecture to ensure success.

Read More