General

Patient Zero

Ransomware had compromised the $5 billion health-care provider that operates 10 hospitals and more than 250 outpatient facilities in the Washington, D.C., region, serving thousands of patients and employing more than 30,000. While exact details were not released before Security…

Read More

LogRhythm Leaders Named EY Entrepreneur of the Year 2016 Award Winners in Mountain Desert Region

Andy Grolnick, Chris Petersen and Phil Villella Recognized for Innovation in Security Category BOULDER, Colorado—June 29, 2016—LogRhythm, The Security Intelligence Company, today announced that its president and CEO Andy Grolnick, CTO and co-founder Chris Petersen, and Chief Scientist and co-founder…

Read More

Mitigating the insider threat to your business

This year, we have seen a steady flow of high profile data breaches hitting the headlines. Whether the result of unknown web vulnerabilities, DDOS attacks or overall lax corporate data security policies, data breaches are becoming an everyday occurrence. In…

Read More

Next-generation SIEM turns low-level security monitoring for high-level business goals

Despite an initial rush to adopt security and information event management (SIEM) tools, complex implementations and a lack of skilled staff left many companies struggling to use SIEM effectively. That’s all set to change, however, as a new generation of…

Read More

Ransomware explosion is the latest security wakeup call for CxOs

The massive data breach of US retailer Target was a wakeup call for senior business executives too often disengaged with cybersecurity issues, but surging ransomware attacks are honing CxOs’ attention on the need for automated analytics tools to detect security…

Read More

“Not uncommon” to limit Internet access, say experts

Pulling the plug on Internet access on work computers is not uncommon in the private sector, say cyber-security experts and industry players, particularly in areas that deal with extra-sensitive information. These include the defence, financial and healthcare industries, but to…

Read More

LogRhythm Wins NetworkWorld Asia 2016 Information Management Award

Awarded for the best of class in Security Information and Event Management category Singapore, 9 June 2016—LogRhythm, a leader in security intelligence and analytics, was awarded the NetworkWorld Asia 2016 Information Management Award in the Security Information and Event Management…

Read More

SANS 2016 Incident Response Survey

Emerging Trends in Incident Response and Survey Results This webinar will cover the results of the third annual SANS survey on incident response. It will explore the continuing evolution of incident response, how tactics and tools have changed in the…

Read More

Nancy Reynolds Recognized as One of CRN’s 2016 Women of the Channel

BOULDER, Colorado—June 8, 2016—LogRhythm, The Security Intelligence Company, today announced that CRN®, a brand of The Channel Company, has named Nancy Reynolds, vice president, Americas Channel Sales, to its prestigious 2016 Women of the Channel list. CRN editors select the…

Read More

Malaysian Banks Not Immune to Cyber Threats

Cyber crimes cost the world up to half a trillion dollars a year and Malaysian banks are as much at risk as its global peers, says Bill Taylor-Mountford from security intelligence firm LogRhythm. He speaks to Bloomberg TV Malaysia’s Han…

Read More

Cybersecurity Startups Set For Surge

Venture capital investment in cyberphysical security startups rose 78% to $228 million in 2015, and will rise to S400 million in 2016 as rapid adoption of the Internet of Things (IoT) raises the threat to products such as connected cars,…

Read More

Exclusive: New strategies to combat cyber attacks, from LogRhythm

Some SMEs are are paying lip service to cyber security, opening themselves up to being just another statistic in the malicious cyber crime game. That’s according to Bill Smith, LogRhythm Senior Vice President of Worldwide Field Operations and Bill Taylor,…

Read More

Discover hidden threats with User Behaviour Analytics (UBA)

As a cyber security professional, you already know that users are both an organisation’s greatest asset and its greatest vulnerability. Users can do great damage— and they’re notoriously difficult to catch. Many companies are confronting this challenge with User Entity…

Read More

Before they were CEOs: what 4 Colorado tech leaders studied in college

We were curious how Colorado tech leaders got their start — from their childhood hopes to where they went to college — and it turns out, these four brought some pretty interesting lessons with them on their way to the…

Read More

LogRhythm’s NetMon 3 Boosts Advanced Threat Detection And Mitigation Via Deep Packet Analytics And Optimized Incident Response  

Detects Ransomware, Spear Phishing, APTs and Other Tier-1 Threats Faster BOULDER, Colorado—May 17, 2016—LogRhythm, The Security Intelligence Company, today announced immediate availability of NetMon 3. This latest version of the industry’s leading network monitoring, analytics and forensics solution empowers organizations…

Read More

Do You Really Know Your Users?

How User Behavior Analytics Can Help You to Detect User Threats As a cybersecurity pro, you already know that users are both an organization’s greatest asset and its greatest vulnerability. Users can do great damage—and they’re notoriously difficult to catch.…

Read More

Leveraging your SIEM to Catch and Respond to Ransomware

Free Training Brought to you by LogRhythm and Ultimate Windows Security Over the past three years, ransomware has jumped into the spotlight of the cyber threat landscape. In fact, the FBI estimates that $1 billion in losses will be incurred…

Read More

Defending Against Cyberthreats: Are You Keeping Up?

An Analysis of CyberEdge’s 2016 Cyberthreat Defense Report Despite record security spending, successful cyberattacks are on the rise. Seventy-six percent of organizations around the globe were compromised by a successful cyber attack in in 2015—up from 62% in 2014. Steve…

Read More