Stay Ahead of Threat Vectors Arising from the SVB Collapse
Posted by: Nicholas Tan
In recent news, Silicon Valley Bank (SVB) experienced a failure and was shut down by regulators, which caused quite a bit of a stir within the tech and finance communities. In the wake of this event, cybercriminals are likely to…
March 15, 2023
LogRhythm Partners with Trend Micro to Help Organizations Around the Globe Automate Threat Detection and Response
New integration streamlines threat detection and response with LogRhythm’s centralized data collection and automation LogRhythm, the company empowering security teams to defend against an ever-evolving threat landscape, today announced its partnership with Trend Micro, a leader in cloud and enterprise…
February 15, 2023
Employee Service Provider Personal Group Deploys LogRhythm SIEM to Proactively Fight Cybersecurity Threats
Personal Group gains a streamlined cybersecurity solution to protect mission-critical and personal data against cyberattacks. LogRhythm, the company helping busy and lean security operations teams save the day, has been selected by Personal Group, a leading UK provider of employee…
February 14, 2023
Why Organizations Should Adopt the Cybersecurity Risk Optimization Approach
Historically, the concern of cyberattacks has put organizations and their IT departments on the defensive as they increase and become more complex. Organizations are investing more than ever to create a defensive security posture that attempts to safeguard every component…
January 9, 2023
LogRhythm and SentinelOne Collaborate to Streamline Enterprise Cybersecurity Prevention and Response
Cybersecurity intelligence firm LogRhythm Inc. said today it’s partnering with the extended detection and response platform provider SentinelOne Inc. on a combined offering aimed at helping companies streamline their security operations and cut through the noise to gain more precise insights into the threats…
December 19, 2022
Securing the Water Supply: Protecting Citizens and Systems from Cyber Threats
Across the globe millions of communities, ecosystems and businesses depend on having reliable access to the water supply. It not only provides drinking and wastewater for citizens, but also supports crucial industries including the agricultural sector.
October 21, 2022
The Power of Predictive Security (page 54-55)
Mazen Dohaji, Vice President (iMETA), LogRhythm, looks at how companies can stay ahead of future threats in the Middle East region.
October 21, 2022
2022 Magic Quadrant™ for SIEM released by Gartner® — LogRhythm Responds with New Cloud-Native Offering
Posted by: Kish Dill
The 2022 Gartner Magic Quadrant for Security Information and Event Management (SIEM) report is out, and LogRhythm is recognized as a Challenger. Gartner based its criteria on products that were generally available by Feb. 1, 2022. Back in February, LogRhythm…
October 13, 2022
Visibility and Network Security: Using Dynamic Data to Prevent Cyberthreats
A lack of visibility enables threats to originate inside an organization’s network security perimeter enabling broad access across the network.
July 15, 2022
In the News [Part 3]
Want to hear about the biggest security headlines directly from industry leaders? LogRhythm is excited to bring you “In the News,” a new webinar series that provides expert advice on navigating the everchanging threat landscape. Channel Sales Engineers Jake Haldeman…
June 28, 2022
Millions impacted in major health breach
Shields Health Care Group suffered a data breach affecting two million patients. Sally Vincent shares how this attack affects the organization and patients and what companies can do to prevent future attacks.
June 15, 2022
SentinelOne Expands Singularity Marketplace with New MDR, SIEM, SOAR, and Asset Management
SentinelOne announced integrations with Arctic Wolf, LogRhythm, and Noetic Cyber expanding the set of capabilities available via SentinelOne’s Singularity Marketplace.
April 18, 2022
Creator of open-source software sabotages own work
A maintainer of a popular piece of open-source software has deliberately sabotaged his own code, in act of hactivism to protest for not getting financial recompense from corporates for his work.
April 15, 2022
In Act of Hacktivism, Open Source Project Maintainer Uses Code to Wipe Russian and Belarusian Computers
In protest of the war in Ukraine, an open source project maintainer targeted computers with Russian or Belarusian IP addresses by overwriting files with a heart symbol.
March 25, 2022
A Look at Cyberwarfare Actions and Detection Using HermeticWiper Malware as the Example | Webinar
March 17, 2022
Why is SS7 still a security threat?
Posted by: Laura Halls
Signalling System 7 (SS7) is still full of holes – what are operators doing about it asks Kate O’Flaherty? SS7 is still full of security holes, despite attempts to police the age-old signalling protocol. In 2017, hackers exploited SS7 as…
March 8, 2022
LogRhythm’s SIEM Platform Provides Proactive Cybersecurity Protection and Real-Time Prevention for ectacom GmbH’s Customers in Germany
ectacom GmbH’s customers can proactively strengthen their cybersecurity defences as European organisations face new and growing cyber threats. Munich, Germany 08 March 2022 — LogRhythm, the company helping busy and lean security operation teams save the day, has partnered with…
March 8, 2022