Security Tips and Tricks

Securing Telehealth Systems

Telehealth: Keeping Critical Connections Secure

In 2019, more than 759 healthcare providers were hit with ransomware.[1] Meanwhile, 2020 showed us the necessity of creating new digital channels to enable critical care. Scrambling to keep patients and doctors connected, many healthcare organizations leveraged new telehealth capabilities…

Read More
Choosing a SOC target operating model

Gartner’s Guide to Choosing a SOC Operating Model

A security operations center (SOC) is crucial to keeping your organization secure, but to succeed in your security investments, you must align your strategy with a clear SOC operating model. According to Gartner, SOC is a considerable amount of security…

Read More
Manage Risk and Compliance in Malaysia’s Financial Industry

Bank Negara of Malaysia’s Risk Management in Technology (RMiT)

Are you in the financial services industry in Malaysia? If you are any of the following, you’ve probably heard of the Bank Negara of Malaysia’s Risk Management in Technology (RMiT) regulation that is applicable to: Licensed banks Licensed investment banks…

Read More

Putting Healthcare-Specific Threat Intelligence to Work

Healthcare organizations are a prime target for cyberattacks. The continuum of care makes for a complex and varied landscape of users, devices, applications, and workflows that attackers can use as entry points into the network. Attackers can also threaten the…

Read More
Medical Device Cybersecurity

Buried Under an Avalanche of Medical Device “Special Snowflakes”

Embracing diversity in people, ideas, and lifestyles adds to a person’s life and can provide new ideas and drive innovation. But, diversity in medical devices adds complexities, costs, and increases the chances of errors. What can make each device a…

Read More
Cybersecurity Resources Center

Top Cybersecurity Resources for Students and Professionals

With a steady increase in breaches and cyberthreats continually on the rise, the demand for skilled cybersecurity professionals is in high demand, making it a solid career choice. Whether you’re considering a new position in cybersecurity, or looking to enhance your…

Read More

Measuring and Improving Cyber Defense Using the MITRE ATT&CK Framework

In this webcast, SANS reviews findings from a recent report, providing expert guidance to help cyber defense professionals learn how to best leverage the MITRE ATT&CK Framework to improve their organization’s security posture.

Read More
Operational Technology Security with LogRhythm

Detecting Operational Technology Threats with Claroty and LogRhythm

Attacks on operational technology (OT) have been rising in the for the last decade.[1] The rise began with the Stuxnet worm that attacked Programmable Logic Controllers (PLCs) in SCADA systems and has increased sharply in the last few years. Much…

Read More

Securing Telemedicine: The Current Landscape and Future Risks

In this on-demand webinar, LogRhythm CSO James Carder and Healthcare Cybersecurity Advisor Kevin McDonald provide an overview of the growing telemedicine landscape, the specific threats attempting to exploit telemedicine, and a step-by-step plan that cybersecurity practitioners can implement to best protect their healthcare organization, practitioners, and patients.

Read More

A Roundup of LogRhythm’s Most Visited Technical Blog Posts

The LogRhythm blog is an abundance of content and insight from our LogRhythm Labs team, security tips and tricks, threat research, infosec news, use cases from our customers, and more to help you stay at the top of your game…

Read More