Staying Ahead of Evolving Cyber Threats
Staying Ahead of Evolving Cyber Threats “Organizations that combine comprehensive visibility, continuous monitoring, advanced analytics, and efficient incident response orchestration are well-positioned to identify and respond to the early indicators of an intruder and rapidly neutralize the threat,” Jonathan Zulberg,…
Read More
May 26, 2022
In the News [Part 2]
Want to hear about the biggest security headlines directly from industry leaders? LogRhythm brings you “In the News,” a new webinar series that provides expert advice on navigating the everchanging threat landscape. Channel Sales Engineers Jake Haldeman & Mike Villavicencio…
Read More
May 24, 2022
Ten Measures to Strengthen the Security Posture
Ten Measures to Strengthen the Security Posture Cyber threats have increased significantly in the wake of increased connectivity and organizations must adopt comprehensive security measures to defend the business. The world is witnessing an unprecedented rate of data generation—by 2025…
Read More
May 24, 2022
Enhance your Detection and Response with LogRhythm MistNet NDR
Securing your network against advanced persistent threats (APTs) requires greater visibility to detect and reduce your response time. As threats increase, cloud-based Network Detection and Response (NDR) solutions are more important than ever. In this webinar, Senior Sales Engineer, Brad…
Read More
May 20, 2022
Priorities in Australia’s IT Sector for the next Government (Part 5)
In this, the fifth instalment in our special series on the state of the IT industry in Australia, we speak with Michael Bovalino, ANZ Country Manager, LogRhythm to get his thoughts on “What our next government needs to do to…
Read More
May 19, 2022
Let’s Talk: Business experts underline key issues ahead of the 2022 elections
Michael Bovalino, ANZ Country Manager, LogRhythm Michael Bovalino, ANZ Country Manager, LogRhythm “Organisations around the world are investing heavily to take advantage of the significant economic and social opportunities that a digital economy can bring. “Australian business ongoing success depends…
Read More
May 19, 2022
LogRhythm Partners with REAL security to Enable Enterprises in the Adriatic Region to Detect and Respond to Cyberthreats
The partnership expands LogRhythm’s footprint into south-east Europe and provides REAL security with world-leading security operations capabilities. Maribor, Slovenia 19 May 2022 — LogRhythm, the company helping busy and lean security operations teams save the day, has launched a strategic…
Read More
May 19, 2022
Scalable, Automated Network Threat Detection in Action
Read More
May 13, 2022
LogRhythm’s partnership with Salvation Army Australia wins Best SIEM – Computer Software at the SBR Technology Excellence Awards 2022
Award winning NextGen SIEM platform was crucial in empowering Salvation Army Australia achieve game-changing cybersecurity posture SINGAPORE – 12 May 2022 – LogRhythm, the company that helps busy and lean security operations teams save the day, has won the award…
Read More
May 11, 2022
Modern Cyber Threats Require A Modern Security Operations Center: Is Your Business Prepared?
The never-ending barrage of alerts and massive amounts of log data to sift through daily leaves many security teams stretched too thin to identify actual threats promptly. That’s why organizations must prioritize modernizing their security operations center (SOC).
Read More
May 10, 2022
Securing U.S. Cleared Defense Contractors Against Russian State-Sponsored Attacks
State-sponsored attacks frequently target numerous U.S. Cleared Defense Contractor (CDC) networks to obtain critical information and other sensitive assets related to the U.S. government’s national security and defense capabilities. For state-sponsored threat actors, gaining access to highly classified information allows…
Read More
May 9, 2022
Training employees to identify a spear phishing attack
Nothing Personal: Training Employees to Identify a Spear Phishing Attack. Phishing attacks began years ago as simple spam, designed to trick recipients into visiting sites and becoming customers. In the meantime, they have morphed into a worldwide criminal industry. In…
Read More
May 9, 2022
Cybersecurity in the IoT World
Cybersecurity in the IoT World: How Telcos Can Secure Critical Infrastructure Against New Threats Over the last year, threat actors have launched a series of major attacks on critical infrastructure, an industry fast becoming one of the most targeted by…
Read More
May 9, 2022
One year removed from the Colonial Pipeline attack, what have we learned?
With May 7 marking the one-year anniversary of the Colonial Pipeline ransomware attack, James Carder shares his perspective on what enterprises should look out for to prevent more attacks such as this.
Read More
May 6, 2022
Exploring the 3 Major Threat Detection Methods: Signature, Behavior, Machine Learning
I kid you not that more than once, it’s been asked, “Which event IDs indicate a security intrusion so I can set up an alert in my SIEM?” If it were only so easy. How do you effectively detect attacker…
Read More
May 6, 2022
Get to know LogRhythm’s Advanced Analytics UEBA | Webinar
Read More
April 28, 2022
Impact and Insights on Log4Shell Vulnerability
Read More
April 28, 2022
Attacks on IoT: The Call to Combat Rising Cyberthreats in the Telco Space
Attacks on IoT: In today’s cyberthreat landscape, threat actors are drawn to organizations that operate within critical infrastructure sectors, including telecommunications (telco), due to the potential to cause significant damage and disturbance to critical processes that benefit ordinary people and…
Read More
April 28, 2022