LogRhythm Labs

IT Pro Portal Logo

SOAR: The Answer to the Cybersecurity Skills Gap and a Future in the Cloud

Cloud is exacerbating the cybersecurity skills gap, but the solution lies in SOAR. As organisations look to protect their data from sophisticated threat actors, there are two intertwining trends that need to be addressed: sweeping organisational migration to the cloud…

Read More

A Roundup of LogRhythm’s Most Visited Technical Blog Posts

The LogRhythm blog is an abundance of content and insight from our LogRhythm Labs team, security tips and tricks, threat research, infosec news, use cases from our customers, and more to help you stay at the top of your game…

Read More

Anatomy of a Hacker Group: APT29 (AKA Cozy Bear)

The threat group APT29, also known as Cozy Bear, is well-known for their alleged work infiltrating the U.S. Democratic National Committee during the 2016 presidential election cycle — but that’s only the tip of the iceberg when it comes to what…

Read More
Doctor working on digital tablet on hospital background

LogRhythm Joins NCCoE’s Technology Collaborators to Help Secure Telehealth Remote Patient Monitoring Ecosystem

It is with great excitement that I share LogRhythm’s involvement in the newest healthcare project from the National Cybersecurity Center of Excellence (NCCoE) — Securing Telehealth Remote Patient Monitoring Ecosystem. The project aims to provide a reference architecture that will…

Read More
Monitoring Remote Worker on VPN

A Security Analyst’s Guide to Monitoring Remote VPN Activity in the LogRhythm SIEM

Remote work is no longer a trend, and is becoming the norm for many companies. Whether your organization has been practicing remote work for a while, or it is just beginning to adopt work-from-home policies, VPN monitoring — the ability…

Read More

Deepen Your Remote Desktop Protocol Visibility with Log Sources

Remote desktop is a common feature in operating systems. It allows a user to connect to a computer in another location and interact with the desktop remotely. Microsoft implemented this capability via its Remote Desktop Protocol (RDP) for Windows desktop…

Read More

What DoD Contractors Need to Know About the New Cybersecurity Maturity Model Certification

The Cybersecurity Maturity Model Certification (CMMC) is a new requirement from the U.S. Department of Defense (DoD). It mandates that DoD contractors obtain third-party certification to ensure appropriate levels of cybersecurity practices are in place to meet “basic cyber hygiene,”…

Read More

Monitor Zoom Security and Privacy Risks Using the LogRhythm NextGen SIEM

The mass migration to remote working in recent times has caused an increased focus on the security of remote collaboration tools. LogRhythm has found a variety of these tools in our customer base and has built collection methods and analytics…

Read More

Detecting Young Domains with Palo Alto Networks and LogRhythm

As the world continues dealing with a pandemic involving the coronavirus disease (COVID-19), malicious campaigns are well underway. For example, an opportunistic attacker will leverage a user’s sense of urgency and curiosity to prompt them to open a malicious email,…

Read More

5 PCI-DSS Compliance Questions Every Security Analyst Should Ask

If you are involved in taking payment for a good or service of any kind, you are likely required to comply with the Payment Card Industry Data Security Standards (PCI-DSS). This comprehensive security framework and compilation of best practices applies…

Read More