Security Tips and Tricks

Measuring and Improving Cyber Defense Using the MITRE ATT&CK Framework

In this webcast, SANS reviews findings from a recent report, providing expert guidance to help cyber defense professionals learn how to best leverage the MITRE ATT&CK Framework to improve their organization’s security posture.

Read More
Operational Technology Security with LogRhythm

Detecting Operational Technology Threats with Claroty and LogRhythm

Attacks on operational technology (OT) have been rising in the for the last decade.[1] The rise began with the Stuxnet worm that attacked Programmable Logic Controllers (PLCs) in SCADA systems and has increased sharply in the last few years. Much…

Read More

Securing Telemedicine: The Current Landscape and Future Risks

In this on-demand webinar, LogRhythm CSO James Carder and Healthcare Cybersecurity Advisor Kevin McDonald provide an overview of the growing telemedicine landscape, the specific threats attempting to exploit telemedicine, and a step-by-step plan that cybersecurity practitioners can implement to best protect their healthcare organization, practitioners, and patients.

Read More

A Roundup of LogRhythm’s Most Visited Technical Blog Posts

The LogRhythm blog is an abundance of content and insight from our LogRhythm Labs team, security tips and tricks, threat research, infosec news, use cases from our customers, and more to help you stay at the top of your game…

Read More

7 Steps to Building A Security Operations Center (SOC)

Most Organizations are Not Equipped to Staff a 24X7 SOC Unfortunately, cyberattacks such as WannaCry and Petya/NotPetya are increasingly becoming the norm. Keeping up with the growing rate of cybersecurity threats may seem impossible when your business is lacking in-house…

Read More

Anatomy of a Hacker Group: APT29 (AKA Cozy Bear)

The threat group APT29, also known as Cozy Bear, is well-known for their alleged work infiltrating the U.S. Democratic National Committee during the 2016 presidential election cycle — but that’s only the tip of the iceberg when it comes to what…

Read More
Man looking at desktop computer monitor.

4 Key Processes to Maximize Security Operations Center Procedure Effectiveness

Building a security operations center (SOC) is a major undertaking, but it’s worth the effort to keep your organization secure. To create an efficient SOC, you need to develop security operations center procedures that connect people, processes, and technologies within…

Read More
Monitoring Remote Worker on VPN

A Security Analyst’s Guide to Monitoring Remote VPN Activity in the LogRhythm SIEM

Remote work is no longer a trend, and is becoming the norm for many companies. Whether your organization has been practicing remote work for a while, or it is just beginning to adopt work-from-home policies, VPN monitoring — the ability…

Read More

Use Case: Detect and Respond to Malware Traffic with NDR

As malicious actors continue to use a variety of techniques to evade detection, it’s paramount to protect your organization’s network activity. You need a solution that can detect and prevent malicious network activity. One solution is network detection and response…

Read More
prevent data exfiltration with network traffic analytics

Prevent Data Exfiltration with Network Traffic Analytics

When it comes to company data, you need to protect it at all costs. But it is hard to defend what you can’t see. This blog post will explore techniques threat actors commonly use to illegally copy an organization’s data,…

Read More