Network Threat Hunting Made Easy With the MistNet NDR MITRE ATT&CK™ Engine
Security professionals are widely adopting MITRE ATT&CK™ for network threat hunting. ATT&CK stands for Adversarial Tactics, Techniques and Common Knowledge, and it represents a globally accessible information base of adversary tactics and techniques based on real-world observations. MITRE ATT&CK provides…
Read MoreFebruary 26, 2021
Threat Detection in the Public Cloud: Cloud Security Solutions
There is no debating it; the public cloud is here to stay, and therefore, the need for cloud security solutions continue to increase. According to Gartner, spending on public cloud services is forecast to grow 18.4% in 2021, totaling $304.9…
Read MoreFebruary 19, 2021
Using the Full Power of SmartResponse Automation
Posted by: Nimasha Jain
Mitigating identified threats is necessary to prevent any breach. Are you wondering how to respond to alerts provided by the LogRhythm NextGen SIEM Platform for identified threats? Analysts can use SmartResponse™ automation to initiate preventive actions such as blocking, blacklisting, and…
Read MoreFebruary 2, 2021
Analyze Attacker Behavior, Endpoint Detection Anomalies with LogRhythm and Carbon Black
As cyberthreats continue to grow, enterprises like yours are challenged more than ever to protect the business from damage. And threats aren’t going away. By 2021, Cybercrime Magazine predicts a ransomware attack will occur on businesses every 11 seconds, up from…
Read MoreJanuary 21, 2021
Code42 and LogRhythm Partner to Protect Against Insider Threats
As remote work has become the norm for many enterprises, organizations are struggling with the troubling reality of rising insider threats. Whether the results are from careless or negligent employees or malicious insiders, it’s crucial to arm your organization with…
Read MoreJanuary 15, 2021
LogRhythm Acquires Threat Detection Platform MistNet
Acquisition expands LogRhythm’s reach in the threat detection space and accelerates XDR market entry with deep visibility into network traffic and potential threats Boulder, Colo. — Jan. 13, 2021 — LogRhythm, the company powering today’s security operations centers (SOCs), announced today it…
Read MoreJanuary 13, 2021
LogRhythm Web Console Vulnerabilities
Posted by: Private: Zack Rowland
Scope High-risk vulnerabilities have been identified in the LogRhythm Web Console. Risk The risk of these vulnerabilities is high. However, “real-world” exploitation of the vulnerabilities does require certain pieces of information about the target organization’s LogRhythm NextGen SIEM and Web…
Read MoreDecember 16, 2020
BlackBerry and LogRhythm Deliver Threat Prevention, Visibility for Zero Trust Environments
To stay on top of the latest threats, you need a broader view of malicious activity that could impact your business. While enterprises traditionally focus on desktop hardware, the mobile space is now gaining traction for cybersecurity protection as their…
Read MoreDecember 8, 2020
Introducing LogRhythm Version 7.6: Easier to Use with Expanded Cloud Capabilities & Enhanced Security
Posted by: Matt Willems
On the heels of LogRhythm version 7.5, LogRhythm is excited to announce the general availability of LogRhythm version 7.6. The new release marks a change in how we’re delivering product updates and features. As part of our commitment to customers,…
Read MoreNovember 18, 2020
Accelerate Malware Detection and Remediation with LogRhythm and Cisco Secure Endpoint
When it comes to threat detection, protecting your organization is no easy feat. Despite your best efforts to block threats with detection solutions, the reality is malware can still get into your network. By the end 2021, experts predict there…
Read MoreNovember 10, 2020
LogRhythm Receives Gartner Peer Insights’ SIEM Customers’ Choice Designation for the 4th Year in a Row
LogRhythm recently received Gartner Peer Insights’ SIEM Customers’ Choice designation for the fourth year in a row. We feel this is an honorable distinction, and one we acknowledge with gratitude. Ultimately, without our loyal customers, and our hard-working staff and…
Read MoreAugust 3, 2020
Introducing LogRhythm Version 7.5: Improve Analysts’ Day-to-Day Workflow
Save Time with Improved Workflows Imagine, you’re alerted of a possible exploit, but you can’t recall whether that system has been patched recently. You try to search for historical data about the host to confirm, but you can’t remember the…
Read MoreJuly 22, 2020
LogRhythm Joins NCCoE’s Technology Collaborators to Help Secure Telehealth Remote Patient Monitoring Ecosystem
It is with great excitement that I share LogRhythm’s involvement in the newest healthcare project from the National Cybersecurity Center of Excellence (NCCoE) — Securing Telehealth Remote Patient Monitoring Ecosystem. The project aims to provide a reference architecture that will…
Read MoreMay 21, 2020
Limited-Time Promotion Allows Security Leaders to Trial LogRhythm Cloud to Gain Remote Workforce Visibility
Month-to-Month Subscription Provides Flexible Option to Monitor Cloud Data Produced by Remote Applications BOULDER, Colorado — May 15, 2020 – LogRhythm, the company powering today’s security operations centers (SOCs), today announced its Remote Workforce Visibility offer to help organizations achieve…
Read MoreMay 15, 2020
LogRhythm Debuts Remote Workforce Offering to Help CISOs Quickly Gain Greater Visibility
Posted by: Andrew Hollister
Contributors to this blog include Andrew Hollister and James Carder. As security and IT teams are dealing with the complications of maintaining security and operations of the business during the stay-at-home order due to the coronavirus and are now managing…
Read MoreMay 6, 2020
Streamline Your Day with the All-New NetMon 4
Here at LogRhythm, we strive to keep improving the security analyst experience. Our latest workflow improvements have arrived with LogRhythm NetMon 4, in which we’ve made it easier and faster to surface threats and investigate issues on your network. We also thought…
Read MoreFebruary 14, 2020
The Case for XDR
Posted by: Chris Petersen
At LogRhythm, we recently revamped how we sell and license our platform’s portfolio of products. We did so to achieve a number of objectives. Our primary objectives were to make it easier for customers to transact with LogRhythm, to ensure…
Read MoreJanuary 13, 2020
Five Steps to Threat Hunting with LogRhythm’s Free Network Security Monitoring Tool
Posted by: Jim Lee
Jim Lee is an information security analyst and guest blogger from Seismic Software Inc. He is an ambassador of cybersecurity education and empowerment for small businesses. Jim configures easy-to-use tools to develop intuitive solutions for small business cybersecurity programs. His…
Read MoreDecember 12, 2019