Security Tips and Tricks

Automated response on adding playbook with LogRhythm

IDC In Conversation – Security Operations Strategy: The Fundamentals to Achieving Cyber Resilience and Efficacy

Cathy Huang, Associate Research Director of IDC Asia/Pacific’s (AP) Services and Security Practice, caught up with Joanne Wong and Leonardo Hutabarat, to discuss the role and differentiation of security operations platforms and how it drives the overall enterprise security efficacy…

Read More

Increase Cyber Resilience with Zero Trust

Read More

How Federal Agencies Can Detect and Block Insider Threats

Read More
Employee Centralizing Process Creation Events with a SIEM

Centralizing Process Creation Events with a SIEM

How Process Creation Events Can Be Centralized for Ease of Analysis Process creation events are written to the Windows Event Log on the local endpoint where they are generated. This raises an obvious issue for defenders looking to proactively review these…

Read More
LogRhythm SIEM Solution

What is SIEM? And How Does it Work?

What is SIEM? SIEM stands for security, information, and event management. SIEM technology aggregates log data, security alerts, and events into a centralized platform to provide real-time analysis for security monitoring. Security operation centers (SOCs) invest in SIEM software to…

Read More
Supercharging LogRhythm: Using Jupyter Notebook to enhance threat hunting

Supercharging LogRhythm: Using Jupyter Notebook to enhance threat hunting

Read More

Conquering CMMC: Tackling the Most Difficult CMMC Controls

Read More

New Techniques to Strengthen Threat Detection and Response

Read More
Computer hardware: Zero Trust tips for devices

Zero Trust Framework: A Guide to Implementation

Implementing a Zero Trust framework across an organization requires leading with a “never trust and always verify” mindset to secure your data and resources. Over the years, organizations have increasingly implemented Zero Trust frameworks into their environment because technological advancements…

Read More

Water Critical Infrastructure Cybersecurity: Detecting an Attack

The need for water critical infrastructure (CI) cybersecurity has become a growing concern as a recent cyberattack has made national headlines. On February 8, 2021, a hacker modified chemicals in a water treatment plant in Oldsmar, Florida. During a press…

Read More