Patient Zero
Ransomware had compromised the $5 billion health-care provider that operates 10 hospitals and more than 250 outpatient facilities in the Washington, D.C., region, serving thousands of patients and employing more than 30,000. While exact details were not released before Security…
Read MoreJuly 1, 2016
LogRhythm Leaders Named EY Entrepreneur of the Year 2016 Award Winners in Mountain Desert Region
Andy Grolnick, Chris Petersen and Phil Villella Recognized for Innovation in Security Category BOULDER, Colorado—June 29, 2016—LogRhythm, The Security Intelligence Company, today announced that its president and CEO Andy Grolnick, CTO and co-founder Chris Petersen, and Chief Scientist and co-founder…
Read MoreJune 29, 2016
Mitigating the insider threat to your business
This year, we have seen a steady flow of high profile data breaches hitting the headlines. Whether the result of unknown web vulnerabilities, DDOS attacks or overall lax corporate data security policies, data breaches are becoming an everyday occurrence. In…
Read MoreJune 25, 2016
Next-generation SIEM turns low-level security monitoring for high-level business goals
Despite an initial rush to adopt security and information event management (SIEM) tools, complex implementations and a lack of skilled staff left many companies struggling to use SIEM effectively. That’s all set to change, however, as a new generation of…
Read MoreJune 16, 2016
Ransomware explosion is the latest security wakeup call for CxOs
The massive data breach of US retailer Target was a wakeup call for senior business executives too often disengaged with cybersecurity issues, but surging ransomware attacks are honing CxOs’ attention on the need for automated analytics tools to detect security…
Read MoreJune 16, 2016
“Not uncommon” to limit Internet access, say experts
Pulling the plug on Internet access on work computers is not uncommon in the private sector, say cyber-security experts and industry players, particularly in areas that deal with extra-sensitive information. These include the defence, financial and healthcare industries, but to…
Read MoreJune 11, 2016
LogRhythm Wins NetworkWorld Asia 2016 Information Management Award
Awarded for the best of class in Security Information and Event Management category Singapore, 9 June 2016—LogRhythm, a leader in security intelligence and analytics, was awarded the NetworkWorld Asia 2016 Information Management Award in the Security Information and Event Management…
Read MoreJune 9, 2016
SANS 2016 Incident Response Survey
Emerging Trends in Incident Response and Survey Results This webinar will cover the results of the third annual SANS survey on incident response. It will explore the continuing evolution of incident response, how tactics and tools have changed in the…
Read MoreJune 9, 2016
Nancy Reynolds Recognized as One of CRN’s 2016 Women of the Channel
BOULDER, Colorado—June 8, 2016—LogRhythm, The Security Intelligence Company, today announced that CRN®, a brand of The Channel Company, has named Nancy Reynolds, vice president, Americas Channel Sales, to its prestigious 2016 Women of the Channel list. CRN editors select the…
Read MoreJune 8, 2016
Malaysian Banks Not Immune to Cyber Threats
Cyber crimes cost the world up to half a trillion dollars a year and Malaysian banks are as much at risk as its global peers, says Bill Taylor-Mountford from security intelligence firm LogRhythm. He speaks to Bloomberg TV Malaysia’s Han…
Read MoreJune 8, 2016
Cybersecurity Startups Set For Surge
Venture capital investment in cyberphysical security startups rose 78% to $228 million in 2015, and will rise to S400 million in 2016 as rapid adoption of the Internet of Things (IoT) raises the threat to products such as connected cars,…
Read MoreJune 7, 2016
Exclusive: New strategies to combat cyber attacks, from LogRhythm
Some SMEs are are paying lip service to cyber security, opening themselves up to being just another statistic in the malicious cyber crime game. That’s according to Bill Smith, LogRhythm Senior Vice President of Worldwide Field Operations and Bill Taylor,…
Read MoreMay 31, 2016
Discover hidden threats with User Behaviour Analytics (UBA)
As a cyber security professional, you already know that users are both an organisation’s greatest asset and its greatest vulnerability. Users can do great damage— and they’re notoriously difficult to catch. Many companies are confronting this challenge with User Entity…
Read MoreMay 26, 2016
Before they were CEOs: what 4 Colorado tech leaders studied in college
We were curious how Colorado tech leaders got their start — from their childhood hopes to where they went to college — and it turns out, these four brought some pretty interesting lessons with them on their way to the…
Read MoreMay 24, 2016
LogRhythm’s NetMon 3 Boosts Advanced Threat Detection And Mitigation Via Deep Packet Analytics And Optimized Incident Response
Detects Ransomware, Spear Phishing, APTs and Other Tier-1 Threats Faster BOULDER, Colorado—May 17, 2016—LogRhythm, The Security Intelligence Company, today announced immediate availability of NetMon 3. This latest version of the industry’s leading network monitoring, analytics and forensics solution empowers organizations…
Read MoreMay 17, 2016
Do You Really Know Your Users?
How User Behavior Analytics Can Help You to Detect User Threats As a cybersecurity pro, you already know that users are both an organization’s greatest asset and its greatest vulnerability. Users can do great damage—and they’re notoriously difficult to catch.…
Read MoreMay 17, 2016
Leveraging your SIEM to Catch and Respond to Ransomware
Free Training Brought to you by LogRhythm and Ultimate Windows Security Over the past three years, ransomware has jumped into the spotlight of the cyber threat landscape. In fact, the FBI estimates that $1 billion in losses will be incurred…
Read MoreMay 12, 2016
Defending Against Cyberthreats: Are You Keeping Up?
An Analysis of CyberEdge’s 2016 Cyberthreat Defense Report Despite record security spending, successful cyberattacks are on the rise. Seventy-six percent of organizations around the globe were compromised by a successful cyber attack in in 2015—up from 62% in 2014. Steve…
Read MoreMay 11, 2016