Lockheed Martin adds LogRhythm to cybersecurity alliance
Lockheed Martin will work with LogRhythm on cybersecurity systems integration pilot programs after the latter signed up for the Lockheed Martin Cyber Security Alliance…
Read MoreMarch 1, 2016
Lockheed Martin will work with LogRhythm on cybersecurity systems integration pilot programs after the latter signed up for the Lockheed Martin Cyber Security Alliance…
Read MoreMarch 1, 2016
Lockheed Martin (NYSE: LMT) announced the addition of LogRhythm, a leader in security intelligence and analytics, to the Lockheed Martin Cyber Security Alliance. Alliance members collaborate to solve growing cybersecurity needs and meet future threats through customer-focused solution design, experiments,…
Read MoreFebruary 29, 2016
BOULDER, Colorado—February 25, 2016—LogRhythm, The Security Intelligence Company, announced today that Nancy Reynolds, vice president of Americas channels, has been named to the prestigious list of the 2016 Channel Chiefs. This is the eighth time that Ms. Reynolds has earned…
Read MoreFebruary 25, 2016
Third-annual Report Surveys Perceptions and Buying Practices of Information Security Decision Makers and Practitioners Across North America, Europe, Asia Pacific, and Latin America Annapolis, MD—February 17, 2016— CyberEdge Group, a premier research, marketing, and publishing firm serving the security industry’s…
Read MoreFebruary 17, 2016
Critical infrastructure like power grids and water supplies has been the target of many theoretical cyber-attacks by academics and white hat hackers for years now, but with the recent shutdown of a power plant in Ukraine by hackers, this threat…
Read MoreFebruary 17, 2016
A catastrophic flaw in one of the Internet’s core building blocks may bring a huge amount of apps and hardware devices vulnerable to attacks, according to researchers. A function performing domain-name lookups called getaddrinfo(), contains a buffer overflow bug that…
Read MoreFebruary 17, 2016
Catch Intruders Living off the Land and Enforce Privileged User Accountability PowerShell is like nuclear fission — it’s powerful, and it can be used for good and evil. PowerShell is one of the best post-exploitation tools out there simply because it’s…
Read MoreFebruary 16, 2016
As technology drives a revolutionary transformation in the healthcare industry buoyed by the latest innovations in cloud computing, analytics, Internet of Things and other disruptive tech trends, healthcare service providers, including insurers, are rapidly becoming targets of cybercriminals. In fact,…
Read MoreJanuary 22, 2016
It was announced on January 12th by security intelligence company, LogRhythm that it has been granted the National Information Assurance Partnership (NIAP) Common Criteria Certification for its v6.3.4 SIEM platform…
Read MoreJanuary 20, 2016
Certifications do matter, but an extensive list of certs with no hands-on learning to show that you can apply and utilize that knowledge won’t bode well in many interviews…
Read MoreJanuary 13, 2016
Award-Winning SIEM Platform Now Available to All Government Agencies BOULDER, Colorado—January 12, 2016—LogRhythm, The Security Intelligence Company, today announced that its LogRhythm v6.3.4 SIEM platform has been awarded the National Information Assurance Partnership (NIAP) Common Criteria Certification #10645 against the…
Read MoreJanuary 12, 2016
CISOs should consider and coordinate incident detection and response in five areas: hosts, networks, threat intelligence, user behavior monitoring, and process automation…
Read MoreJanuary 11, 2016
Guest post by James Carder, CISO of LogRhythm, VP of LogRhythm Labs…
Read MoreJanuary 8, 2016
BOULDER, Colo.—December 16, 2015—LogRhythm, The Security Intelligence Company, today announced the appointment of Daniel Wilbricht as senior director of federal sales. In this role, Wilbricht oversees the alignment and execution of product, marketing, sales, service, support and channels to optimize…
Read MoreDecember 16, 2015
AppLocker is Window’s built-in application whitelisting technology. Despite AppLocker requiring a lot of planning, research and commitment to ongoing care and feeding, in audit mode the application has unlocked potential. Audit mode, provides a really cool way to know immediately…
Read MoreDecember 15, 2015
BOULDER, Colo.—October 8, 2015—LogRhythm, The Security Intelligence Company, today unveiled LogRhythm 7, a major upgrade to its leading security intelligence and analytics platform. New innovations in search, scalability, performance and security operations efficiencies will help organizations detect and respond faster…
Read MoreOctober 8, 2015
BOULDER, Colo.—October 6, 2015—LogRhythm, The Security Intelligence Company, today announced that industry research firm Gartner gave LogRhythm the highest scores when evaluating solution capabilities for three common SIEM use cases: compliance, threat management and SIEM. Thirteen vendors were evaluated and…
Read MoreOctober 6, 2015
LogRhythm cited for ability to reduce mean-time-to-detect and mean-time-to-respond to incidents for better threat mitigation and remediation BOULDER, Colo.—September 29, 2015— Based on its recent analysis of the security information and event management log management (SIEM/LM) market, Frost & Sullivan…
Read MoreSeptember 29, 2015