General

Help Net Security | Insights into insider threats: Detecting and monitoring abnormal user activity

Insights Into Insider Threats: Detecting and Monitoring Abnormal User Activity

Most organizations focus their threat detection and prevention strategies on external cyberthreats however internal threats are just as dangerous. LogRhythm’s CISO Andrew Hollister shared his thoughts with Help Net Security on how the attack surface for insider threats is expanding…

Read More
Shot of a group of businesspeople talking together over a digital tablet in an office

Building a business case for your SIEM Investment

Chief information security officers (CISOs) are wasting millions of dollars on security products they don’t use – or they are investing in tools that fail to protect their organizations against cyber threats. Almost 75 per cent of attendees at the…

Read More

67% of Companies Admit They Have Lost Deals Because of Low Confidence in Their Security Strategy, According to Research from LogRhythm

Global research finds external stakeholders are increasingly expecting vendors to meet specific security requirements to win and retain business LogRhythm, the company empowering security teams to defend against the ever-evolving threat landscape, today announced the release of its report, “The…

Read More
Three Steps to Translate Threat Reports into Actionable Items Using MITRE ATT&CK®

Security from simplicity: Why complexity is the enemy of security

IT security is complicated. It’s an arms race. Hackers and Chief Information Security Officers (CISOs) are stuck in a never-ending game of whack-a-mole, where vulnerabilities keep popping up that security teams try and fix before they can be exploited by…

Read More

Why Zero Trust Security Matters Now

It’s no longer a question of why you need Zero Trust, but how soon can you adopt the strategy. In this webinar, LogRhythm CISO Andrew Hollister, discusses the importance of Zero Trust and reveals best practices to adopt this security architecture to ensure success.

Read More
Digital Journal logo

Threat Experts Share 2023 Cybersecurity Predictions

How will cybersecurity develop as 2023 unfolds and what are likely to be the main trends for the year ahead, both in terms of the threat landscape and the types of technologies and processes tat businesses will need to develop to defends…

Read More

Cybersecurity Predictions for 2023

Experts anticipate that 2023 will bring more evolved ransomware, a push toward stronger cybersecurity within organizations, and many other trends, some extrapolated, others novel.

Read More

­How CISOs can protect their growing infrastructure without blowing the budget

The volume of data flowing through corporate networks is increasing at a phenomenal rate and will continue for the foreseeable future. As companies grow, the amount of data they are responsible for protecting also increases. More data requires more infrastructure,…

Read More
Digitalisation World Logo

A Framework First Approach for Cybersecurity

Andrew Hollister, LogRhythm CISO and VP of LogRhythm Labs, discusses the findings of a recent report, produced in association with the Ponemon Institute – covering the current threat landscape, the need for clear communications between the CISO and the CEO/board…

Read More

The CISO’s Guide to Choosing the Right SIEM

Cybersecurity has evolved into one of the most important departments in any organization. Forty years ago, long before connectivity was ubiquitous, IT security involved ensuring the computer room was locked so criminals couldn’t steal the floppy disks or punch cards.…

Read More
Bank of England

Cyberattacks Are the Most Cited Risk to the UK Financial System

The latest research from The Bank of England has revealed that 74% of financial institutions declared that a cyberattack was amongst the top risks they thought would have the greatest impact on the UK financial system if they were to…

Read More
Healthcare IT News

Cyberwarfare Against Health Systems: The Nation-State Threat

While criminal organizations and chaos actors are responsible for a substantial percentage of the constant cyberattacks on provider organizations’ data and information systems, another growing threat comes from nation-state perpetrators.

Read More

How to avoid data exfiltration during the current ‘great resignation’

Businesses faced with these threats are finding they can be a challenge to prevent. Detecting the theft of data by an employee is difficult as it can closely resemble legitimate business activity. In recent years, it’s been made even more…

Read More

Bright spots in local tech hiring buck global gloom

The outlook for cyber-security hiring remains positive as well, because it remains a key investment priority for many businesses to fend off larger and increasingly sophisticated attacks, said Ms Joanne Wong, vice-president of international markets at cyber-security company LogRhythm.

Read More

CybersecAsia readers recognize Asia Pacific’s leaders in cybersecurity

SINGAPORE, Nov. 3, 2022 /PRNewswire/ — Over the last two years, organizations across Asia Pacific have grown much more aware about cybersecurity – what with many high-profile global, regional and local security breaches hogging the headlines – and Board and C-suite executives have had…

Read More

LogRhythm reinforces APAC industry leadership in Security Information & Event Management, winning CybersecAsia Readers’ Choice Award 2022 for Best in Security Information & Event Management

Third consecutive year receiving the award for Best in SIEM testament to high customer trust towards LogRhythm across APAC markets Singapore, November 1, 2022 – LogRhythm, the company empowering security teams to navigate the ever-changing threat landscape with confidence, today…

Read More
LogRhythm Announces Integration with the Gigamon Hawk Deep Observability Pipeline

LogRhythm Announces Integration with the Gigamon Hawk Deep Observability Pipeline

New integration will help customers rapidly detect and respond to anomalies and threats across their networks LogRhythm, the company helping busy and lean security operation teams save the day, announced its technology integration with Gigamon, the leading deep observability company.…

Read More

Securing the Water Supply: Protecting Citizens and Systems from Cyber Threats

Across the globe millions of communities, ecosystems and businesses depend on having reliable access to the water supply. It not only provides drinking and wastewater for citizens, but also supports crucial industries including the agricultural sector.

Read More