7 Steps to Building A Security Operations Center (SOC)
Gathering and analyzing information about potential and existing cyber threats to better understand the tactics, techniques, and procedures (TTPs) of adversaries is made significantly easier after building a security operations center. But, what is a SOC? Where can you learn…
Read More
February 16, 2023
Boost Your Threat Hunting with 12 Weeks of Security Spotlights
Chief security information officers (CISOs) are on the frontline when it comes to arming their security team against the ever-evolving threat landscape. As part of our commitment to empower security teams to navigate new and emerging cyberthreats, we are delivering…
Read More
February 10, 2023
Preparing your IT security defences for the year ahead
With the cybersecurity threat landscape continuing to evolve, security operations centre (SOC) teams are taking time at the start of the new year to review their strategies and key protective measures. SOC teams understand that effective security can never be…
Read More
January 26, 2023
Why Zero Trust is the Best Security Strategy for 2023
While the concept has been in existence since the early 2000s, many organisations are yet to take the plunge. Instead, they opt to continue with legacy security measures and add additional tools as required. Taking this approach, however, can be…
Read More
January 19, 2023
Stop Asking if Your Organization is Secure — It’s Not
Posted by: Andrew Hollister
“Is my organization secure?” If you are asking that question, you are asking the wrong question. There is an important, underlying truth that the entire industry needs to acknowledge and be more transparent about; there is no such thing as…
Read More
January 18, 2023
2023 Cybersecurity Predictions
Posted by: Kelsey Gast
With the start of a new year, LogRhythm is announcing our 2023 cybersecurity predictions! This is a tradition at LogRhythm, as each year our executives reveal cyberthreats organizations across the globe may potentially face. Looking back at our 2022 and…
Read More
January 10, 2023
Why Organizations Should Adopt the Cybersecurity Risk Optimization Approach
Historically, the concern of cyberattacks has put organizations and their IT departments on the defensive as they increase and become more complex. Organizations are investing more than ever to create a defensive security posture that attempts to safeguard every component…
Read More
January 9, 2023
“Law by Law”: Your Guide to Cybersecurity Compliance in Singapore
Posted by: Nicholas Tan
As Singapore continues to brand itself as a digital-first country, businesses will also have to adhere to a high cybersecurity standard to inspire confidence in all stakeholders. Ideally, companies should already be in compliance to one of the many cybersecurity…
Read More
January 2, 2023
Reducing Ransomware Risk in Healthcare
Editor’s Note: This a partnered sponsored guest blog written by Avertium. How much are you willing to pay to get your personal data back? How about hundreds and thousands of personal data records stored in your company? The impacts of…
Read More
December 28, 2022
Cybersecurity Priorities For Water Utilities: Providing a Secure Foundation for Transformation and Automation (Page 92-23)
In this article for Smart Water Magazine, LogRhythm’s CISO Andrew Hollister shares his thoughts on how water utilities can manage and prevent cyberattacks on their systems and networks.
Read More
December 16, 2022
Insights Into Insider Threats: Detecting and Monitoring Abnormal User Activity
Most organizations focus their threat detection and prevention strategies on external cyberthreats however internal threats are just as dangerous. LogRhythm’s CISO Andrew Hollister shared his thoughts with Help Net Security on how the attack surface for insider threats is expanding…
Read More
December 16, 2022
3 Major Threat Detection Methods Explained
The importance of threat detection cannot be overstated. A recent Verizon study revealed that the top discovery method (more than 50%) for breaches is in fact disclosure by the threat actor themselves after a successful compromise.
Read More
December 14, 2022
Introducing Security Spotlights
Gain the Cybersecurity Insights Needed to Reduce Noise, Prioritize Work and Quickly Secure Your Environment. Your cybersecurity needs are constantly changing as cybersecurity threats continue to evolve and increase in complexity. At LogRhythm, we are always looking to make it…
Read More
November 24, 2022
A Framework First Approach for Cybersecurity
Andrew Hollister, LogRhythm CISO and VP of LogRhythm Labs, discusses the findings of a recent report, produced in association with the Ponemon Institute – covering the current threat landscape, the need for clear communications between the CISO and the CEO/board…
Read More
November 23, 2022
Understanding DDoS Attacks on US Airport Websites and Escalating Critical Infrastructure Cyberattacks
Pro-Russian hacking group Killnet has claimed credit for a series of distributed denial-of-service (DDoS) attacks executed against US airport websites on October 10. Several websites for airports across the US were affected
Read More
November 11, 2022
How to Clean up the Tool-Sprawl Mess
Editor’s Note: This a partnered sponsored guest blog written by Cadre See a problem, throw a technology at it. See another problem, throw another technology at it. According to a global survey by IBM, this mindset has led to enterprises…
Read More
September 26, 2022
The Art and Science of Threat Hunting – A Guide to Preventing Cyberattacks
Editor’s Note: This a partnered sponsored guest blog written by Avertium. What is threat hunting? Cyber threat hunting is a proactive cybersecurity strategy that searches through networks to detect and isolate advanced threats before they present themselves. Threat hunters do…
Read More
September 22, 2022
SOC Modernization: Building a Strong Foundation
Editor’s Note: This a partnered sponsored guest blog written by Cadre. The core paradigm of today’s security operation center (SOC) is having the right tools paired with the right technologies and using automation to make sense of the mountain of…
Read More
August 30, 2022