Supercharging LogRhythm: Using Jupyter Notebook to enhance threat hunting
March 3, 2021
Implementing a Zero Trust framework across an organization requires leading with a “never trust and always verify” mindset to secure your data and resources. Over the years, organizations have increasingly implemented Zero Trust frameworks into their environment because technological advancements…
Read MoreFebruary 22, 2021
The need for water critical infrastructure (CI) cybersecurity has become a growing concern as a recent cyberattack has made national headlines. On February 8, 2021, a hacker modified chemicals in a water treatment plant in Oldsmar, Florida. During a press…
Read MoreFebruary 20, 2021
This is the second part of a blog series discussing Windows process creation events. Part one introduced process creation events and discussed why they should be enabled. In this post, we will take a deeper dive and first look at…
Read MoreFebruary 11, 2021
2020 was certainly an eventful year in the land of cybersecurity. There was no shortage of ransomware attacks and data breaches, and my personal prediction is that 2021 will be no different Large organizations are increasingly making significant investments in…
Read MoreJanuary 27, 2021
Data Privacy Day is an international effort that occurs annually on January 28th to raise security awareness and promote data protection best practices. LogRhythm’s CSO, James Carder, sheds light on why this day is so influential: “Data Privacy Day serves as an…
Read MoreJanuary 27, 2021
Industrial control systems (ICS) play a fundamental role in monitoring complex industrial processes and infrastructure. Proper ICS security is critical, as these systems often face malicious threats and cyberattacks. The National Institute of Standards and Technology (NIST) explains the importance…
Read MoreDecember 30, 2020
Hard-coded is a term used to describe when a software developer embeds data directly into the source code of a program or script, rather than supplying it externally as a parameter. If the data consists of user credentials, this can…
Read MoreDecember 22, 2020
The use of Docker containers is rapidly becoming the standard approach for most companies to deploy services in their environment; however, it also introduces risks and vulnerabilities. Explore the pros and cons of containers and how to mitigate Docker container…
Read MoreDecember 15, 2020
Developing a professional brand takes time and experience that can go hand in hand with executing your job well, but in order to truly build your presence as a successful security leader, there are extra steps you can take to…
Read MoreDecember 7, 2020
Watch this on-demand webcast to dive deeper into the themes explored in the SANS white paper “How to Address a Pervasive and Unrelenting Threat,” written by SANS instructor Justin Henderson. Along with Justin, you’ll learn from a panel of cybersecurity experts about how to protect against infection vectors, the latest trends in ransomware attacks, and how defending against ransomware changes when considering remote workforces.
Read MoreNovember 23, 2020
More and more organizations are shifting to remote work, reaping the benefits of social distancing and enhanced worker safety. But danger still looms. Without the top-down cybersecurity defenses of on-premise work environments and the close oversight of security experts, remote…
Read MoreNovember 20, 2020
A security information and event management (SIEM) solution provides real-time visibility across an organization’s network and IT environment, making it more efficient to detect and respond to cyberthreats. In order to meet security needs for growing business demands, expanding team…
Read MoreNovember 17, 2020
A security operations center (SOC) is like a machine. But like a machine, when one component is not working, performance can come to a standstill. Among the various elements — people, process, and technology — required to run an effective security operation, people…
Read MoreNovember 16, 2020