General

Jonathan Zulberg

Staying Ahead of Evolving Cyber Threats

Staying Ahead of Evolving Cyber Threats “Organizations that combine comprehensive visibility, continuous monitoring, advanced analytics, and efficient incident response orchestration are well-positioned to identify and respond to the early indicators of an intruder and rapidly neutralize the threat,” Jonathan Zulberg,…

Read More
In the News Part 2

In the News [Part 2]

Want to hear about the biggest security headlines directly from industry leaders? LogRhythm brings you “In the News,” a new webinar series that provides expert advice on navigating the everchanging threat landscape. Channel Sales Engineers Jake Haldeman & Mike Villavicencio…

Read More
Enterprise IT World logo

Ten Measures to Strengthen the Security Posture

Ten Measures to Strengthen the Security Posture Cyber threats have increased significantly in the wake of increased connectivity and organizations must adopt comprehensive security measures to defend the business. The world is witnessing an unprecedented rate of data generation—by 2025…

Read More
Enhance your Detection and Response with LogRhythm MistNet NDR

Enhance your Detection and Response with LogRhythm MistNet NDR

Securing your network against advanced persistent threats (APTs) requires greater visibility to detect and reduce your response time. As threats increase, cloud-based Network Detection and Response (NDR) solutions are more important than ever. In this webinar, Senior Sales Engineer, Brad…

Read More
Michael Bovalino, Country Manager, ANZ

Priorities in Australia’s IT Sector for the next Government (Part 5)

In this, the fifth instalment in our special series on the state of the IT industry in Australia, we speak with Michael Bovalino, ANZ Country Manager, LogRhythm to get his thoughts on “What our next government needs to do to…

Read More
Michael Bovalino, Country Manager, ANZ

Let’s Talk: Business experts underline key issues ahead of the 2022 elections

Michael Bovalino, ANZ Country Manager, LogRhythm Michael Bovalino, ANZ Country Manager, LogRhythm “Organisations around the world are investing heavily to take advantage of the significant economic and social opportunities that a digital economy can bring. “Australian business ongoing success depends…

Read More
REAL security PR image

LogRhythm Partners with REAL security to Enable Enterprises in the Adriatic Region to Detect and Respond to Cyberthreats

The partnership expands LogRhythm’s footprint into south-east Europe and provides REAL security with world-leading security operations capabilities.  Maribor, Slovenia 19 May 2022 — LogRhythm, the company helping busy and lean security operations teams save the day, has launched a strategic…

Read More
Scalable Automated Network Threat Detection in Action

Scalable, Automated Network Threat Detection in Action

Read More

LogRhythm’s partnership with Salvation Army Australia wins Best SIEM – Computer Software at the SBR Technology Excellence Awards 2022

Award winning NextGen SIEM platform was crucial in empowering Salvation Army Australia achieve game-changing cybersecurity posture SINGAPORE – 12 May 2022 – LogRhythm, the company that helps busy and lean security operations teams save the day, has won the award…

Read More
forbes logo

Modern Cyber Threats Require A Modern Security Operations Center: Is Your Business Prepared?

The never-ending barrage of alerts and massive amounts of log data to sift through daily leaves many security teams stretched too thin to identify actual threats promptly. That’s why organizations must prioritize modernizing their security operations center (SOC).

Read More
American Flag on flag pole

Securing U.S. Cleared Defense Contractors Against Russian State-Sponsored Attacks

State-sponsored attacks frequently target numerous U.S. Cleared Defense Contractor (CDC) networks to obtain critical information and other sensitive assets related to the U.S. government’s national security and defense capabilities. For state-sponsored threat actors, gaining access to highly classified information allows…

Read More
Helpnet Security logo

Training employees to identify a spear phishing attack

Nothing Personal: Training Employees to Identify a Spear Phishing Attack. Phishing attacks began years ago as simple spam, designed to trick recipients into visiting sites and becoming customers. In the meantime, they have morphed into a worldwide criminal industry. In…

Read More
The Fast Mode logo

Cybersecurity in the IoT World

Cybersecurity in the IoT World: How Telcos Can Secure Critical Infrastructure Against New Threats Over the last year, threat actors have launched a series of major attacks on critical infrastructure, an industry fast becoming one of the most targeted by…

Read More
TechRepublic Logo

One year removed from the Colonial Pipeline attack, what have we learned?

With May 7 marking the one-year anniversary of the Colonial Pipeline ransomware attack, James Carder shares his perspective on what enterprises should look out for to prevent more attacks such as this.

Read More
Exploring the 3 Major Threat Detection Methods

Exploring the 3 Major Threat Detection Methods: Signature, Behavior, Machine Learning

I kid you not that more than once, it’s been asked, “Which event IDs indicate a security intrusion so I can set up an alert in my SIEM?” If it were only so easy. How do you effectively detect attacker…

Read More

Get to know LogRhythm’s Advanced Analytics UEBA | Webinar

Read More
Log4Shell Vulnerability

Impact and Insights on Log4Shell Vulnerability

Read More
Mohan Raj

Attacks on IoT: The Call to Combat Rising Cyberthreats in the Telco Space

Attacks on IoT: In today’s cyberthreat landscape, threat actors are drawn to organizations that operate within critical infrastructure sectors, including telecommunications (telco), due to the potential to cause significant damage and disturbance to critical processes that benefit ordinary people and…

Read More