LogRhythm Labs

Panel of LogRhythm Experts Discuss Security Awareness Programs

Experts Weigh in on National Cybersecurity Awareness Program

In honor of National Cybersecurity Awareness Month, we sat down with some of our security experts to talk about their experience raising awareness in the industry and implementing cyber training. Read the interview to get their thoughts and some inspiration…

Read More
LogRhythmIT Operations Module Dashboard

Exploring IT Operations with LogRhythm

The LogRhythm NextGen SIEM Platform collects, classifies, and normalizes log data from over 800 unique source types. At LogRhythm, our focus has always been on identifying and mitigating security threats through monitoring, alarming, and event log correlation. And while we…

Read More

How to Balance Security Maturity and Compliance with LogRhythm

Compliance doesn’t guarantee prevention against a breach, and it never will. Various frameworks, legislation, and regulations are meant to lay part of the foundation for organizations to build and expand on; though this rarely is the case. While different industries…

Read More
Compromise: Abnormal Process Activity” from the UEBA module

Aligning the LogRhythm NextGen SIEM Platform with the MITRE ATT&CK Framework

Contributors to this blog include Dan Kaiser and Brian Coulson. The MITRE ATT&CK framework is quickly becoming a focal point in the security world — and for good reason. This framework provides a consistent, industry-wide standard on which you can…

Read More
Legitimate interest is a popular topic for searching on Google

Exploring Legitimate Interest within the GDPR

We often get asked how to position, illustrate, and sell products worldwide when everyone still has the General Data Protection Regulation (GDPR) on their mind. We receive so many inquiries, that we decided to create this blog post. Depending on…

Read More

Simplify Compliance with LogRhythm’s Consolidated Compliance Framework and NIST

Compliance may seem complicated, but here at LogRhythm, were doing our best to simplify the hassle. As new compliance and security-related legislation, regulations, and standards are introduced every year, you might not know which regulations apply to your organization or…

Read More

8 Cybersecurity Predictions for 2019

For the fourth year in a row, the LogRhythm Labs team came together to answer a question that’s on everyone’s mind this time of year: what is going to happen in cybersecurity next year? A few weeks ago, we revisited…

Read More

Looking Back at LogRhythm Labs’ 2018 Predictions for Security – How Did We Do?

About this time every year, the LogRhythm Labs team watches bird flights, performs divination rituals, and contemplates what might happen in the world of information security in the coming year. Last year, we started a new tradition of examining our…

Read More

Your Questions About New U.S. State-Level Data Protection Laws Answered

This year, at least 11 U.S. states passed new or updated laws, with several specifically focused on data breach notification and data protection. From Alabama implementing its first data breach notification law to California passing its Consumer Privacy Act and…

Read More

Creating and Managing Playbooks with LogRhythm APIs

New to LogRhythm 7.4: Playbooks Feature Set Standard procedures have been a cornerstone of security best practice since their invention. You may call them runbooks, standing procedures, checklists, or playbooks. Either way, you likely have one or more collections of…

Read More