LogRhythm Labs

Past Cybersecurity Predictions: A Look at What We Got Right — Part II

In 2020, we learned that even a global pandemic can’t slow down cyberattacks, and threat actors are still very much at large seeking new ways to gain control of vital data and bring organizations to their knees. In addition to…

Read More
cybersecurity-predictions-2021

Past Cybersecurity Predictions: A Look at What We Got Right — Part I

Around this time every year, leaders from across industries sit down to reflect on the trends they have seen over the course of the previous months and how these developments might shape the year ahead. At LogRhythm, it’s our annual…

Read More
Ransomware Prevention Panel: How to Address a Pervasive and Unrelenting Threat

Ransomware Prevention Panel: How to Address a Pervasive and Unrelenting Threat

Watch this on-demand webcast to dive deeper into the themes explored in the SANS white paper “How to Address a Pervasive and Unrelenting Threat,” written by SANS instructor Justin Henderson. Along with Justin, you’ll learn from a panel of cybersecurity experts about how to protect against infection vectors, the latest trends in ransomware attacks, and how defending against ransomware changes when considering remote workforces.

Read More
Secure mobile app ensuring data privacy

The State of Data Privacy. Do You Have Rights to Your Data?

2020 has been full of surprises, but what’s not surprising is that we’re now more virtual than we have ever been. Consider the last 30 days of your life. Have you entered credit card information online? Did you allow said…

Read More
LogRhythm AI Engine: Credential Access: Credential Dumping | MITRE ATT&CK Module

What is ZeroLogon? How to Detect and Patch

TL/DR What is ZeroLogon? In Layman’s Terms ZeroLogon is the name for a Microsoft cryptography vulnerability found in CVE-2020-1472 that makes it easy for cybercriminals to hack into your system by impersonating any computer. The Cybersecurity and Infrastructure Agency has…

Read More
Man working in office

7 Common CISO Pain Points and How to Overcome Them

Working in cybersecurity has its clear benefits: bringing value to a vital industry, competitive pay, and a thriving job market. With any career, however, there will always be pain points and some aspects that are less exciting than others. As someone…

Read More
Landscape photo of New York City and Brooklyn Bridge

NYDFS 500 First Enforcement Action

In July 2020, the New York State Department of Financial Services (NYDFS) filed the first enforcement action under the NYDFS Cybersecurity Regulation, 23 NYCRR Part 500 (Part 500), against First American Title Insurance Company (First American), a large title insurance…

Read More
Computer screen of sourcing code.

What is the Zero Trust Model of Cybersecurity, Really?

The Zero Trust Model framework is the next evolution of our security model. Explore what exactly the Zero Trust model is and how companies have successfully implemented their own models. The Zero Trust Model Explained The original Zero Trust model…

Read More
New CMMC Updates

New Cybersecurity Maturity Model Certification (CMMC) Updates

In our last blog, What DoD Contractors Need to Know About the New Cybersecurity Maturity Model Certification, we covered the essential components and driving factors behind the DoD’s new federal requirement. This post addresses some of the unanswered questions around…

Read More
IT Pro Portal Logo

SOAR: The Answer to the Cybersecurity Skills Gap and a Future in the Cloud

Cloud is exacerbating the cybersecurity skills gap, but the solution lies in SOAR. As organisations look to protect their data from sophisticated threat actors, there are two intertwining trends that need to be addressed: sweeping organisational migration to the cloud…

Read More