Security Tips and Tricks

Supercharging LogRhythm: Using Jupyter Notebook to enhance threat hunting

Supercharging LogRhythm: Using Jupyter Notebook to enhance threat hunting

Read More

Conquering CMMC: Tackling the Most Difficult CMMC Controls

Read More

New Techniques to Strengthen Threat Detection and Response

Read More
Computer hardware: Zero Trust tips for devices

Zero Trust Framework: A Guide to Implementation

Implementing a Zero Trust framework across an organization requires leading with a “never trust and always verify” mindset to secure your data and resources. Over the years, organizations have increasingly implemented Zero Trust frameworks into their environment because technological advancements…

Read More
critical infrastructure

Water Critical Infrastructure Cybersecurity: Detecting an Attack

The need for water critical infrastructure (CI) cybersecurity has become a growing concern as a recent cyberattack has made national headlines. On February 8, 2021, a hacker modified chemicals in a water treatment plant in Oldsmar, Florida. During a press…

Read More
LogRhythm On Demand Webinar Detecting and Blocking Malware Threats with SIEM and EDR

Detecting and Blocking Malware Threats with SIEM and EDR

Read More
Security analyst threat hunting on computer with process creation events

How to Enable Process Creation Events to Track Malware and Threat Activity

This is the second part of a blog series discussing Windows process creation events. Part one introduced process creation events and discussed why they should be enabled. In this post, we will take a deeper dive and first look at…

Read More
Dated Zero Trust in 2020? Make a Commitment in 2021!

Dated Zero Trust in 2020? Make a Commitment in 2021!

Read More
Security analyst on work computer tracking threat activity with process monitoring

What are Windows Process Creation Events and Why You Should Enable Them

2020 was certainly an eventful year in the land of cybersecurity. There was no shortage of ransomware attacks and data breaches, and my personal prediction is that 2021 will be no different Large organizations are increasingly making significant investments in…

Read More
VPN on computer to provide data privacy protection

Data Privacy Day in 2021

Data Privacy Day is an international effort that occurs annually on January 28th to raise security awareness and promote data protection best practices. LogRhythm’s CSO, James Carder, sheds light on why this day is so influential: “Data Privacy Day serves as an…

Read More
Wind turbine manufacturing facility.

What is ICS Security? How to Defend Against Attacks

Industrial control systems (ICS) play a fundamental role in monitoring complex industrial processes and infrastructure. Proper ICS security is critical, as these systems often face malicious threats and cyberattacks. The National Institute of Standards and Technology (NIST) explains the importance…

Read More
A computer laptop showing code.

Detecting Hard-Coded Credentials with LogRhythm

Hard-coded is a term used to describe when a software developer embeds data directly into the source code of a program or script, rather than supplying it externally as a parameter. If the data consists of user credentials, this can…

Read More
Image of stacked shipping containers

How to Mitigate Docker Container Security Risk

The use of Docker containers is rapidly becoming the standard approach for most companies to deploy services in their environment; however, it also introduces risks and vulnerabilities. Explore the pros and cons of containers and how to mitigate Docker container…

Read More
CISO in professional business suit

CISO Resources and Tips to Build a Professional Brand

Developing a professional brand takes time and experience that can go hand in hand with executing your job well, but in order to truly build your presence as a successful security leader, there are extra steps you can take to…

Read More
Ransomware Prevention Panel: How to Address a Pervasive and Unrelenting Threat

Ransomware Prevention Panel: How to Address a Pervasive and Unrelenting Threat

Watch this on-demand webcast to dive deeper into the themes explored in the SANS white paper “How to Address a Pervasive and Unrelenting Threat,” written by SANS instructor Justin Henderson. Along with Justin, you’ll learn from a panel of cybersecurity experts about how to protect against infection vectors, the latest trends in ransomware attacks, and how defending against ransomware changes when considering remote workforces.

Read More
Cybersecurity Awareness Checklist Blog Post Header

Cybersecurity Awareness Checklist for Remote Workers

More and more organizations are shifting to remote work, reaping the benefits of social distancing and enhanced worker safety. But danger still looms. Without the top-down cybersecurity defenses of on-premise work environments and the close oversight of security experts, remote…

Read More
A CISO showing value of a SIEM solution to coworker

How CISOs Can Use a SIEM Solution to Show Value of Their Program

A security information and event management (SIEM) solution provides real-time visibility across an organization’s network and IT environment, making it more efficient to detect and respond to cyberthreats. In order to meet security needs for growing business demands, expanding team…

Read More
Shaking Hands

How to Build and Retain a Strong Security Operations Team

A security operations center (SOC) is like a machine. But like a machine, when one component is not working, performance can come to a standstill. Among the various elements — people, process, and technology — required to run an effective security operation, people…

Read More