LogRhythm mashes up security and big data to give SMBs better defense in one tool
Security Intelligence Management (SIM) can even the playing field between IT and cybersecurity attackers. Here’s how one of the leaders in the space offers a real-time battle strategy…
Read More
April 6, 2016
Ransomware: Time for a HIPAA Update?
The recent surge in ransomware attacks on hospitals has at least one member of Congress contemplating whether HIPAA’s breach notification requirements need to be clarified or updated to reflect the trend…
Read More
March 29, 2016
MedStar Shuts Systems After Cyberattack
A March 28 cyberattack that may have involved ransomware forced MedStar Health, a 10-hospital system serving Maryland and the Washington, D.C. area, to shut down many of its systems to avoid the spread of the malware…
Read More
March 29, 2016
Defending Against Insider Threats: Malicious and Benign
SC Media 20/20 Webcast How safe are you from an insider attack? Despite the numerous press reports of devastating outsider attacks, insider attacks (deliberate or accidental) put your corporation at risk. In this 20/20 webcast with SC Media, James Carder,…
Read More
March 22, 2016
Protecting Your Business from the Ransomware Threat
In this webinar, LogRhythm looks at the business problems surrounding the new and evolved ransomware threat. The webinar also gives you a brief technical overview of how these schemes function and how they can be spotted and responded to early…
Read More
March 21, 2016
Harnessing your inner SIEM
The buzzword in 2015 was cyber threat intelligence (CTI) – everyone wanted useful data and analytical tools for next-gen cyber security to detect and respond to threats faster. The industry responded by providing a plethora of CTI products. Matt Willems,…
Read More
March 21, 2016
LogRhythm expanding Boulder presence to accommodate growth
Fast-growing cybersecurity firm LogRhythm Inc. is adding more real estate in Boulder, with another 50 employees expected to come onboard locally this year…
Read More
March 16, 2016
An ex-Ofcom employee stole commercially sensitive data about the UK’s major TV broadcasters – and then offered it to one of them
Ofcom has admitted that a former employee stole data from the regulator exposing commercially sensitive information about the UK’s biggest TV companies…
Read More
March 10, 2016
UK businesses fail at security awareness
UK organizations are putting their reputation, customer trust and competitive advantage at greater risk by failing to provide their staff with effective security awareness and capability to defend against cyber attacks…
Read More
March 7, 2016
Not in my house: Amazon’s unencrypted devices a sitting target, cybersecurity experts say
The news landed like a record scratch Thursday, when security industry heavyweights gathered at the RSA conference in San Francisco heard Amazon plans to stop protecting the data customers store on its tablets and other devices with a technology called…
Read More
March 4, 2016
Only 28% of cyber-attacks are reported by UK biz
Research from the Institute of Directors (IoD) and Barclays says that only 43 percent of the nearly 1,000 IoD members polled know where their data is physically stored. The research said, “This is a truly frightening statistic. It effectively means…
Read More
March 4, 2016
Lockheed Martin adds LogRhythm to cybersecurity alliance
Lockheed Martin will work with LogRhythm on cybersecurity systems integration pilot programs after the latter signed up for the Lockheed Martin Cyber Security Alliance…
Read More
March 1, 2016
LogRhythm joins Lockheed Martin cybersecurity alliance
Lockheed Martin (NYSE: LMT) announced the addition of LogRhythm, a leader in security intelligence and analytics, to the Lockheed Martin Cyber Security Alliance. Alliance members collaborate to solve growing cybersecurity needs and meet future threats through customer-focused solution design, experiments,…
Read More
February 29, 2016
Nancy Reynolds of LogRhythm Recognized as 2016 CRN® Channel Chief
BOULDER, Colorado—February 25, 2016—LogRhythm, The Security Intelligence Company, announced today that Nancy Reynolds, vice president of Americas channels, has been named to the prestigious list of the 2016 Channel Chiefs. This is the eighth time that Ms. Reynolds has earned…
Read More
February 25, 2016
76 Percent of Organizations Breached in 2015, Finds ‘2016 Cyberthreat Defense Report’
Third-annual Report Surveys Perceptions and Buying Practices of Information Security Decision Makers and Practitioners Across North America, Europe, Asia Pacific, and Latin America Annapolis, MD—February 17, 2016— CyberEdge Group, a premier research, marketing, and publishing firm serving the security industry’s…
Read More
February 17, 2016
Critical infrastructure: A clear and present danger
Critical infrastructure like power grids and water supplies has been the target of many theoretical cyber-attacks by academics and white hat hackers for years now, but with the recent shutdown of a power plant in Ukraine by hackers, this threat…
Read More
February 17, 2016
Massive web vulnerability puts devices at risk
A catastrophic flaw in one of the Internet’s core building blocks may bring a huge amount of apps and hardware devices vulnerable to attacks, according to researchers. A function performing domain-name lookups called getaddrinfo(), contains a buffer overflow bug that…
Read More
February 17, 2016
PowerShell Audit Logging Deep Dive
Catch Intruders Living off the Land and Enforce Privileged User Accountability PowerShell is like nuclear fission — it’s powerful, and it can be used for good and evil. PowerShell is one of the best post-exploitation tools out there simply because it’s…
Read More
February 16, 2016