Infosec News

Modern ciso ponemon report

More than a third of organizations hold no one accountable for cyberattacks, according to research from LogRhythm

The global research reveals the disconnect between business decision makers and security teams, even as new risks from remote working and ransomware grow. London, UK. – June 22, 2021 – LogRhythm, the company powering today’s security operations centers (SOCs), has…

Read More
The Total Economic Impact of the LogRhythm Platform

Total Economic Impact™ Study Reveals 258% ROI for LogRhythm SIEM

Organizations seeking a platform to mature their security operations center (SOC) and reduce risk to the business must make monumental decisions when choosing a security solution. IT security leaders need to understand the benefits, costs, and risks associated with implementing…

Read More
RSA Virtual Conference 2021

Highlights from RSAC 2021: Zero Trust, XDR, Cybersecurity Careers, and More

In the months since the global pandemic impacted the U.S., people shifted to new ways of working and living, and new obstacles to overcome. As if the Covid-19 pandemic wasn’t challenging enough, this year we’ve already witnessed prominent cybersecurity attacks…

Read More
SC Media

Sunspot Malware Scoured Servers for SolarWinds Builds That it Could Weaponize

The novelty of the malware “stems from how well it blends into the build process,” said Brian Coulson, principal threat research engineer at LogRhythm. “The adversary appears to have had great knowledge of the build process prior to the execution of…

Read More

Russian Hack Against the U.S. Government ‘Will Take Years to Overcome,’ Former National Intelligence Official Says

Susan Gordon, former principal deputy director of national intelligence, told CNBC that the massive cyberattack targeting federal agencies “will take years to overcome” as senior intelligence officials report there is little doubt the Russians were the perpetrators and that they’re still at…

Read More
Man working in office

7 Common CISO Pain Points and How to Overcome Them

Working in cybersecurity has its clear benefits: bringing value to a vital industry, competitive pay, and a thriving job market. With any career, however, there will always be pain points and some aspects that are less exciting than others. As someone…

Read More
Home device connected with mobile phone

Keeping Connected Devices Secure: National Cybersecurity Awareness Month Week 4

Do Your Part. #BeCyberSmart is the motto at the heart of this year’s National Cybersecurity Awareness Month (NCSAM). Promoted by the National Cybersecurity and Infrastructure Agency, the month-long event, now in its 17th year, offers key guidance in a world…

Read More
Computer screen of sourcing code.

What is the Zero Trust Model of Cybersecurity, Really?

The Zero Trust Model framework is the next evolution of our security model. Explore what exactly the Zero Trust model is and how companies have successfully implemented their own models. The Zero Trust Model Explained The original Zero Trust model…

Read More
State of the Security Team

5 Ways to Alleviate Stress on Security Teams

Security teams are under more stress than ever. While that fact may not exactly make you fall out of your chair with surprise, our recent research report found that a whopping 75 percent of security professionals say they have more…

Read More
Global Security Mag - The unique Cybersecurity dangers of Black Friday 2020, Logrhythm comments

Australia Comes Under Comprehensive, ‘State-Sponsored’ Cyber Attack, LogRhythm Comments

Today, the Australian Prime Minister Scott Morrison announced that the country is under sustained and sophisticated ‘state-sponsored’ cyberattack that is targeting all levels of government, essential services and business. The attacks have been happening for over a month and are…

Read More

Deepen Your Remote Desktop Protocol Visibility with Log Sources

Remote desktop is a common feature in operating systems. It allows a user to connect to a computer in another location and interact with the desktop remotely. Microsoft implemented this capability via its Remote Desktop Protocol (RDP) for Windows desktop…

Read More

Monitor Zoom Security and Privacy Risks Using the LogRhythm NextGen SIEM

The mass migration to remote working in recent times has caused an increased focus on the security of remote collaboration tools. LogRhythm has found a variety of these tools in our customer base and has built collection methods and analytics…

Read More