LogRhythm’s platform thwarts threats by analyzing log data
Boulder, Colorado-based security company LogRhythm has developed a software platform that collects, organizes, manages, and analyzes millions to hundreds of millions of pieces of log data…
Read MoreMarch 8, 2017
The six stages of a cyber attack lifecycle
In response to the shortcomings of prevention-centric security strategies, and the challenges of securing an increasingly complex IT environment, organizations…
Read MoreMarch 6, 2017
Study user behavior to focus intrusion detection
Organizations have long sought to reduce their data breach detection time and increase their ability to mitigate breaches more quickly…
Read MoreMarch 3, 2017
Global cybercrime prosecution a patchwork of alliances
One of the biggest issues is that unlike traditional bank robbers, who used to try to escape by driving their getaway cars across the state lines, modern cyber-crooks hide overseas…
Read MoreMarch 1, 2017
Finding Bad Things on Your Network Using Free Tools
Want to get started on a hunt team and discover the bad things on your network? This episode is for the threat hunter on a budget. Rob McGovern, LogRhythm security expert, and John Strand, of Security Weekly and SANS, showcase…
Read MoreFebruary 23, 2017
Prevent Major Data Breaches with Threat Lifecycle Management
Reduce Time to Detect and Respond to Cyber Threats—Without Adding Resources Download Slide Deck Today’s reality is that organizations will continue to be confronted by increasingly frequent and complex cyber threats A traditional prevention-centric strategy naively assumes all threats can…
Read MoreFebruary 9, 2017
How security approaches are evolving in Southeast Asia and beyond
Bill Smith, senior vice-president of worldwide field operations at LogRhythm, talks to Computer Weekly about the big shift in cyber security…
Read MoreFebruary 8, 2017
4 Easy Ways to Turn Endpoint Data into Actionable Insight
LogRhythm and Carbon Black for Endpoint Protection Download Slide Deck Data-driven security is the future, but alarm fatigue and data overload continue to hold security operations teams back. Fortunately, there are some easy ways to organize and correlate data so…
Read MoreFebruary 7, 2017
20 ways to attract good luck
Check out these quotes from a pile of executives who share their views on how anyone can be luckier…
Read MoreJanuary 30, 2017
Portable Network Forensics Empower Threat Detection and Incident Response
Portable Network Forensics Empower Threat Detection and Incident Response Sera-Brynn is a global “Top 10” cybersecurity audit and advisory firm. Their U.S.-based cybersecurity experts are dedicated to helping clients secure their computing and network environments, and meet applicable (and in…
Read MoreJanuary 28, 2017
Packets Don’t Lie: What’s Really Happening on Your Network?
SANS Reviews LogRhythm NetMon Freemium Download Slide Deck When it comes to detection and response, you need full visibility into what’s traversing your network. In this on-demand webcast, Dave Shackleford, senior SANS analyst, provides a functional review of LogRhythm’s NetMon…
Read MoreJanuary 19, 2017
UK firms struggling to manage cyber threats, survey shows
UK businesses are struggling to detect, prevent and respond to cyber threats, a survey of 2,000 IT professionals from companies of various sizes across 14 industry sectors has revealed…
Read MoreJanuary 19, 2017
What to watch for with ransomware: 2017 edition
Ransomware will continue to evolve in 2017, bringing new and diverse threats to businesses. What changes are in store?
Read MoreJanuary 7, 2017
Soaring number of computers hijacked for ransom
The FBI said every hour, about 4,000 computers around the world become infected with ransomware. That’s just an estimate…
Read MoreJanuary 6, 2017
Prediction: The internet will shut down for 24 hours next year
It’s December, that time of the year when many industry experts make all sorts of predictions for the year ahead. But one prophecy caught Business Insider’s eye: The whole internet will shut down for 24 hours…
Read MoreDecember 21, 2016
Interview with Dubai One TV
Mazen Dohaji, MENA Regional Director for LogRhythm, speaks about the impact of cybersecurity attacks on a global level…
Read MoreDecember 18, 2016
Cheers and jeers for Obama’s hard line against Russian hackers
President Barack Obama on Friday indicated that the United States will retaliate against Russia for hacking emails and other material from the Democratic National Committee and the Clinton campaign in an effort to help Donald Trump defeat Hillary Clinton in…
Read MoreDecember 16, 2016
IT professionals hold little back in reaction to Yahoo breach
The pioneering search and web services provider, whose home page starts more browser sessions than anybody in the world, revealed Dec. 14 that new security issues had impacted the personal data of more than 1 billion of its users…
Read MoreDecember 16, 2016