General

CybersecAsia readers recognize Asia Pacific’s leaders in cybersecurity

SINGAPORE, Nov. 3, 2022 /PRNewswire/ — Over the last two years, organizations across Asia Pacific have grown much more aware about cybersecurity – what with many high-profile global, regional and local security breaches hogging the headlines – and Board and C-suite executives have had…

Read More

LogRhythm reinforces APAC industry leadership in Security Information & Event Management, winning CybersecAsia Readers’ Choice Award 2022 for Best in Security Information & Event Management

Third consecutive year receiving the award for Best in SIEM testament to high customer trust towards LogRhythm across APAC markets Singapore, November 1, 2022 – LogRhythm, the company empowering security teams to navigate the ever-changing threat landscape with confidence, today…

Read More
LogRhythm Announces Integration with the Gigamon Hawk Deep Observability Pipeline

LogRhythm Announces Integration with the Gigamon Hawk Deep Observability Pipeline

New integration will help customers rapidly detect and respond to anomalies and threats across their networks LogRhythm, the company helping busy and lean security operation teams save the day, announced its technology integration with Gigamon, the leading deep observability company.…

Read More

Securing the Water Supply: Protecting Citizens and Systems from Cyber Threats

Across the globe millions of communities, ecosystems and businesses depend on having reliable access to the water supply. It not only provides drinking and wastewater for citizens, but also supports crucial industries including the agricultural sector.

Read More
Mazen Dohaji headshot

The Power of Predictive Security (page 54-55)

Mazen Dohaji, Vice President (iMETA), LogRhythm, looks at how companies can stay ahead of future threats in the Middle East region.

Read More
Digital Journal logo

Killnet Strikes at the Heart of the Bulgarian State

Multiple Bulgarian government agencies have suffered a cyberattack during October 2022. This appears to be at the hands of Russian threat actor Killnet. The distributed denial of service (DDoS) attack was massive in scale. The impact was to paralyze the websites of…

Read More
LogRhythm Wins Best SIEM Solution in the 2022 CyberSecurity Breakthrough Awards

LogRhythm Wins Best SIEM Solution in the 2022 CyberSecurity Breakthrough Awards

Leading cybersecurity analytics company recognized as best in the industry LogRhythm, the company empowering security teams to navigate the ever-changing threat landscape with confidence, today announced its recognition as the industry’s Best SIEM Solution in the 2022 CyberSecurity Breakthrough Awards.…

Read More
A screenshot of the LogRhythm Axon Log Management platform dashboard.

LogRhythm Axon: Our Vision of a Cloud-Native Platform

Today is an important day in LogRhythm’s history. We unveiled LogRhythm Axon, our new groundbreaking, cloud-native, security operations platform that easily ingests, enriches, and analyzes multiple log sources. Out of the gate, Axon provides an easy-to-use log management solution. This…

Read More
LogRhythm Introduces Groundbreaking Cloud-Native Security Operations Platform

LogRhythm Introduces Groundbreaking, Cloud-Native Security Operations Platform

New LogRhythm Axon’s intuitive analyst experience and enhancements to LogRhythm SIEM, NDR and UEBA empower security teams to detect and disarm cyberthreats Leading security intelligence company, LogRhythm, today unveiled LogRhythm Axon, a groundbreaking, cloud-native security operations platform. Since 2003, LogRhythm…

Read More
LogRhythm NDR UI

Ease the Analyst Workflow with LogRhythm NDR

It’s easy to get lost in all the noise when trying to surface and make sense of potential threats to your organization’s network. Keeping your environment safe is a constant struggle with bad actors continuously looking for new ways to…

Read More

Gary Abad Joins LogRhythm as the VP of Global Channels

Industry Veteran Rejoins LogRhythm to Grow the Company’s Channel Partner Program LogRhythm, the company helping busy and lean security operation teams save the day, today announced the appointment of Gary Abad as VP of Global Channels. Abad joins LogRhythm as…

Read More

Les cybermenaces à forte incidence : Le risque de ransomware pour les infrastructures vitales en France

Lors de la pandémie, les infrastructures vitales en France ont été confrontées à des défis sans précédent. Les citoyens sont devenus de plus en plus dépendants des services d’urgence, des organismes publics et des fournisseurs de services publics, et les…

Read More

Building a Threat-Ready Ransomware Response Plan

Across the globe, ransomware continues to be one of the top threats facing modern organisations. This evolving high-risk threat uses malicious software to restrict access to an individual’s or company’s vital information, and then demands some form of payment to…

Read More

Shanghai Police Leak Reveals China To Be As Vulnerable As Any Nation

LogRhythm’s Andrew Hollister answers questions about the recent data breech experienced by Shanghai National Police.

Read More

Updates to the Critical Infrastructure Information Act are Long Overdue

Learn about the Critical Infrastructure Information Act, including what it is and why changes to it are needed in the current landscape of cyber threats.

Read More

Diversity Talks 2022: Progress over perfection

Joanne Wong (LogRhythm) urges companies to take action and create a supportive ecosystem that helps working mothers combat their feelings of guilt and inadequacy when returning to the workforce.

Read More

How can businesses improve the digital experiences of their employees?

Cybersecurity is no longer a nice-to-have; it’s essential for your employees’ overall digital experience. While the latest cybersecurity technologies can help to detect nefarious activity and contain and neutralize threats promptly, they don’t completely immunize organizations from being compromised.

Read More

Fighting back against the rising tide of software supply-chain attacks

Of all the issues being faced by IT security teams, one that is gaining increased attention is the threat of a successful software supply chain attack. These attacks, mounted by cybercriminals who inject malicious code into a legitimate software application,…

Read More