General

LogRhythm mashes up security and big data to give SMBs better defense in one tool

Security Intelligence Management (SIM) can even the playing field between IT and cybersecurity attackers. Here’s how one of the leaders in the space offers a real-time battle strategy…

Read More

Ransomware: Time for a HIPAA Update?

The recent surge in ransomware attacks on hospitals has at least one member of Congress contemplating whether HIPAA’s breach notification requirements need to be clarified or updated to reflect the trend…

Read More

MedStar Shuts Systems After Cyberattack

A March 28 cyberattack that may have involved ransomware forced MedStar Health, a 10-hospital system serving Maryland and the Washington, D.C. area, to shut down many of its systems to avoid the spread of the malware…

Read More

Defending Against Insider Threats: Malicious and Benign

SC Media 20/20 Webcast How safe are you from an insider attack? Despite the numerous press reports of devastating outsider attacks, insider attacks (deliberate or accidental) put your corporation at risk. In this 20/20 webcast with SC Media, James Carder,…

Read More

Protecting Your Business from the Ransomware Threat

In this webinar, LogRhythm looks at the business problems surrounding the new and evolved ransomware threat. The webinar also gives you a brief technical overview of how these schemes function and how they can be spotted and responded to early…

Read More

Harnessing your inner SIEM

The buzzword in 2015 was cyber threat intelligence (CTI) – everyone wanted useful data and analytical tools for next-gen cyber security to detect and respond to threats faster. The industry responded by providing a plethora of CTI products. Matt Willems,…

Read More

LogRhythm expanding Boulder presence to accommodate growth

Fast-growing cybersecurity firm LogRhythm Inc. is adding more real estate in Boulder, with another 50 employees expected to come onboard locally this year…

Read More

An ex-Ofcom employee stole commercially sensitive data about the UK’s major TV broadcasters – and then offered it to one of them

Ofcom has admitted that a former employee stole data from the regulator exposing commercially sensitive information about the UK’s biggest TV companies…

Read More

UK businesses fail at security awareness

UK organizations are putting their reputation, customer trust and competitive advantage at greater risk by failing to provide their staff with effective security awareness and capability to defend against cyber attacks…

Read More

Not in my house: Amazon’s unencrypted devices a sitting target, cybersecurity experts say

The news landed like a record scratch Thursday, when security industry heavyweights gathered at the RSA conference in San Francisco heard Amazon plans to stop protecting the data customers store on its tablets and other devices with a technology called…

Read More

Only 28% of cyber-attacks are reported by UK biz

Research from the Institute of Directors (IoD) and Barclays says that only 43 percent of the nearly 1,000 IoD members polled know where their data is physically stored. The research said, “This is a truly frightening statistic. It effectively means…

Read More

Lockheed Martin adds LogRhythm to cybersecurity alliance

Lockheed Martin will work with LogRhythm on cybersecurity systems integration pilot programs after the latter signed up for the Lockheed Martin Cyber Security Alliance…

Read More

LogRhythm joins Lockheed Martin cybersecurity alliance

Lockheed Martin (NYSE: LMT) announced the addition of LogRhythm, a leader in security intelligence and analytics, to the Lockheed Martin Cyber Security Alliance. Alliance members collaborate to solve growing cybersecurity needs and meet future threats through customer-focused solution design, experiments,…

Read More

Nancy Reynolds of LogRhythm Recognized as 2016 CRN® Channel Chief

BOULDER, Colorado—February 25, 2016—LogRhythm, The Security Intelligence Company, announced today that Nancy Reynolds, vice president of Americas channels, has been named to the prestigious list of the 2016 Channel Chiefs. This is the eighth time that Ms. Reynolds has earned…

Read More

76 Percent of Organizations Breached in 2015, Finds ‘2016 Cyberthreat Defense Report’

Third-annual Report Surveys Perceptions and Buying Practices of Information Security Decision Makers and Practitioners Across North America, Europe, Asia Pacific, and Latin America Annapolis, MD—February 17, 2016— CyberEdge Group, a premier research, marketing, and publishing firm serving the security industry’s…

Read More

Critical infrastructure: A clear and present danger

Critical infrastructure like power grids and water supplies has been the target of many theoretical cyber-attacks by academics and white hat hackers for years now, but with the recent shutdown of a power plant in Ukraine by hackers, this threat…

Read More

Massive web vulnerability puts devices at risk

A catastrophic flaw in one of the Internet’s core building blocks may bring a huge amount of apps and hardware devices vulnerable to attacks, according to researchers. A function performing domain-name lookups called getaddrinfo(), contains a buffer overflow bug that…

Read More

PowerShell Audit Logging Deep Dive

Catch Intruders Living off the Land and Enforce Privileged User Accountability PowerShell is like nuclear fission — it’s powerful, and it can be used for good and evil. PowerShell is one of the best post-exploitation tools out there simply because it’s…

Read More