Insights Into Insider Threats: Detecting and Monitoring Abnormal User Activity
Most organizations focus their threat detection and prevention strategies on external cyberthreats however internal threats are just as dangerous. LogRhythm’s CISO Andrew Hollister shared his thoughts with Help Net Security on how the attack surface for insider threats is expanding…
Read MoreDecember 16, 2022
Building a business case for your SIEM Investment
Posted by: Nicholas Tan
Chief information security officers (CISOs) are wasting millions of dollars on security products they don’t use – or they are investing in tools that fail to protect their organizations against cyber threats. Almost 75 per cent of attendees at the…
Read MoreDecember 14, 2022
67% of Companies Admit They Have Lost Deals Because of Low Confidence in Their Security Strategy, According to Research from LogRhythm
Global research finds external stakeholders are increasingly expecting vendors to meet specific security requirements to win and retain business LogRhythm, the company empowering security teams to defend against the ever-evolving threat landscape, today announced the release of its report, “The…
Read MoreDecember 8, 2022
Security from simplicity: Why complexity is the enemy of security
Posted by: Nicholas Tan
IT security is complicated. It’s an arms race. Hackers and Chief Information Security Officers (CISOs) are stuck in a never-ending game of whack-a-mole, where vulnerabilities keep popping up that security teams try and fix before they can be exploited by…
Read MoreDecember 7, 2022
Why Zero Trust Security Matters Now
It’s no longer a question of why you need Zero Trust, but how soon can you adopt the strategy. In this webinar, LogRhythm CISO Andrew Hollister, discusses the importance of Zero Trust and reveals best practices to adopt this security architecture to ensure success.
Read MoreDecember 2, 2022
Threat Experts Share 2023 Cybersecurity Predictions
How will cybersecurity develop as 2023 unfolds and what are likely to be the main trends for the year ahead, both in terms of the threat landscape and the types of technologies and processes tat businesses will need to develop to defends…
Read MoreDecember 1, 2022
Cybersecurity Predictions for 2023
Experts anticipate that 2023 will bring more evolved ransomware, a push toward stronger cybersecurity within organizations, and many other trends, some extrapolated, others novel.
Read MoreDecember 1, 2022
How CISOs can protect their growing infrastructure without blowing the budget
Posted by: Nicholas Tan
The volume of data flowing through corporate networks is increasing at a phenomenal rate and will continue for the foreseeable future. As companies grow, the amount of data they are responsible for protecting also increases. More data requires more infrastructure,…
Read MoreNovember 30, 2022
A Framework First Approach for Cybersecurity
Andrew Hollister, LogRhythm CISO and VP of LogRhythm Labs, discusses the findings of a recent report, produced in association with the Ponemon Institute – covering the current threat landscape, the need for clear communications between the CISO and the CEO/board…
Read MoreNovember 23, 2022
The CISO’s Guide to Choosing the Right SIEM
Posted by: Nicholas Tan
Cybersecurity has evolved into one of the most important departments in any organization. Forty years ago, long before connectivity was ubiquitous, IT security involved ensuring the computer room was locked so criminals couldn’t steal the floppy disks or punch cards.…
Read MoreNovember 22, 2022
Cyberattacks Are the Most Cited Risk to the UK Financial System
Posted by: Richard Edwards
The latest research from The Bank of England has revealed that 74% of financial institutions declared that a cyberattack was amongst the top risks they thought would have the greatest impact on the UK financial system if they were to…
Read MoreNovember 18, 2022
Cyberwarfare Against Health Systems: The Nation-State Threat
While criminal organizations and chaos actors are responsible for a substantial percentage of the constant cyberattacks on provider organizations’ data and information systems, another growing threat comes from nation-state perpetrators.
Read MoreNovember 11, 2022
How to avoid data exfiltration during the current ‘great resignation’
Businesses faced with these threats are finding they can be a challenge to prevent. Detecting the theft of data by an employee is difficult as it can closely resemble legitimate business activity. In recent years, it’s been made even more…
Read MoreNovember 10, 2022
Bright spots in local tech hiring buck global gloom
The outlook for cyber-security hiring remains positive as well, because it remains a key investment priority for many businesses to fend off larger and increasingly sophisticated attacks, said Ms Joanne Wong, vice-president of international markets at cyber-security company LogRhythm.
Read MoreNovember 9, 2022
CybersecAsia readers recognize Asia Pacific’s leaders in cybersecurity
SINGAPORE, Nov. 3, 2022 /PRNewswire/ — Over the last two years, organizations across Asia Pacific have grown much more aware about cybersecurity – what with many high-profile global, regional and local security breaches hogging the headlines – and Board and C-suite executives have had…
Read MoreNovember 4, 2022
LogRhythm reinforces APAC industry leadership in Security Information & Event Management, winning CybersecAsia Readers’ Choice Award 2022 for Best in Security Information & Event Management
Third consecutive year receiving the award for Best in SIEM testament to high customer trust towards LogRhythm across APAC markets Singapore, November 1, 2022 – LogRhythm, the company empowering security teams to navigate the ever-changing threat landscape with confidence, today…
Read MoreNovember 1, 2022
LogRhythm Announces Integration with the Gigamon Hawk Deep Observability Pipeline
New integration will help customers rapidly detect and respond to anomalies and threats across their networks LogRhythm, the company helping busy and lean security operation teams save the day, announced its technology integration with Gigamon, the leading deep observability company.…
Read MoreOctober 27, 2022
Securing the Water Supply: Protecting Citizens and Systems from Cyber Threats
Across the globe millions of communities, ecosystems and businesses depend on having reliable access to the water supply. It not only provides drinking and wastewater for citizens, but also supports crucial industries including the agricultural sector.
Read MoreOctober 21, 2022