Security Tips and Tricks

Guide to Building a Cybersecurity Incident Response Plan [Part 2]

Having a cybersecurity incident response plan is essential for any organization that wants to be prepared for a security incident. By being prepared for an incident, your organisation is able to align and respond quickly if and when one happens.…

Read More

Guide to Building a Cybersecurity Incident Response Plan [Part 1]

Cybersecurity incidents are a fact of life in today’s digital world. Every day, organizations of all sizes are targeted by hackers and other cyber criminals. In 2022, there were over 600 billion cyberattacks worldwide, and the number is only expected…

Read More
Improving the SOC analyst experience featuring Forrester and LogRhythm

Improving the SOC Analyst Experience

It’s essential to continuously improve the analyst experience (AX) and maximize the team’s efficiency when protecting the organization. Focusing on what matter the most to security analysts and making their job easier can also reduce burnout and help you retain…

Read More

How to Build a Future-Ready IT Security Strategy

Despite all the preventative steps being taken by organisations around the world, cybercrime is continuing to grow at an alarming rate. Industry research shows that, during 2022, there was a ransomware attack launched every 11 seconds and the global annual…

Read More
Insurance policy

How SIEM Helps With Cyber Insurance

To gain proper coverage, organizations have to evaluate their needs, and demonstrate appropriate levels of security monitoring to obtain a policy. For many companies, that means investing in security information and event management (SIEM). Is it the only answer to…

Read More

Preventing Healthcare Cyberattacks via HL7 exploits with LogRhythm

Healthcare organizations are a lucrative target for bad actors due to their unique position; they store sensitive patient information, provide a critical service to the public, and typically do not have massive cybersecurity budgets. This makes the healthcare industry particularly…

Read More
Two men working on the computer

Is Your Cybersecurity Vendor Built to Thrive or Struggling to Survive?

The last several years were an incredible run for the cybersecurity industry. Even as the pandemic put pressure on many areas of the global economy, technology companies — and cybersecurity vendors in particular — thrived. Venture capital was plentiful, company…

Read More

How to protect against double-extortion ransomware attacks

Of all the cybersecurity challenges facing organisations today, one of the most pervasive is ransomware attacks. According to research firm Statista, during the first half of 2022 there were a total of 236.1 million ransomware attacks worldwide. During these attacks,…

Read More

Thailand PDPA: What you need to know

Following the steps of her fellow neighbours in the APAC region, Thailand enforced the Personal Data Protection Act (PDPA) as of June 1 2022. Signed in 2019 and postponed twice during the pandemic, this Act has been the talk of…

Read More

Unmasking the Illusion: The Art of Phishing and Identity Theft Exposed

A closer look at the sender’s email address could also be a giveaway that an email is malicious in nature. For instance, every company has their own company domain name at the end of each email; eg.: [email protected]. Usually, a malicious…

Read More
LogRhythm NDR solution

What is Network Detection and Response (NDR)?

Network Detection and Response Defined Network detection and response (NDR) solutions are advanced security products that use artificial intelligence (AI) such as machine learning to detect and alert potential cyberthreats within an organization’s network. NDR tools help security operations and network…

Read More

Starting your Zero-Trust Journey

With the world undergoing technological evolution every day and arriving at the post-pandemic age, it is apparent that data security has become more relevant than ever. As such, companies require a more reliable security model that protects both the people…

Read More

Why SaaS Security Needs to Receive Constant Attention

Lured by the promise of lower operating costs and improved flexibility, many businesses are continuing to increase their usage of software-as-a-service (SaaS) offerings. Designed to provide support to almost every function within a business, SaaS platforms remove the need for…

Read More

Overcoming the challenge of MFA ‘fatigue’ attacks

As growing numbers of organizations shore up their IT security by deploying multi-factor authentication, the technology is becoming an increasing target for cybercriminals. No longer able to gain access to IT infrastructures simply by stealing passwords and identity credentials, the…

Read More

Broken English no longer a sign of scams as crooks tap AI bots like ChatGPT: Experts

Bad grammar has long been a telltale sign that a message or a job offer is likely to be a scam. But cyber-security experts said those days may be over as generative artificial intelligence (AI) chatbots like ChatGPT have helped…

Read More

Stay Ahead of Threat Vectors Arising from the SVB Collapse

In recent news, Silicon Valley Bank (SVB) experienced a failure and was shut down by regulators, which caused quite a bit of a stir within the tech and finance communities. In the wake of this event, cybercriminals are likely to…

Read More
In the News [Part 5] Webinar

In the News [Part 5]

Join Jake Haldeman and Mike V. on this on-demand webinar to keep up with the latest cybersecurity headlines and what you can do to defend against these perils with LogRhythm!

Read More
Data on a laptop screen.

The State of the Security Team

The success of the cybersecurity team requires support across the entire organization. LogRhythm’s 2022 State of the Security Team global research report, provides insightful statistics regarding the current stressors security professionals face, and ways executives can address these challenges. In…

Read More