Security Tips and Tricks

7 Steps to Building A Security Operations Center (SOC)

Gathering and analyzing information about potential and existing cyber threats to better understand the tactics, techniques, and procedures (TTPs) of adversaries is made significantly easier after building a security operations center. But, what is a SOC? Where can you learn…

Read More
Boost Your Threat Hunting with 12 Weeks of Security Spotlights

Boost Your Threat Hunting with 12 Weeks of Security Spotlights

Chief security information officers (CISOs) are on the frontline when it comes to arming their security team against the ever-evolving threat landscape. As part of our commitment to empower security teams to navigate new and emerging cyberthreats, we are delivering…

Read More
Michael Bovalino, Country Manager, ANZ

Preparing your IT security defences for the year ahead

With the cybersecurity threat landscape continuing to evolve, security operations centre (SOC) teams are taking time at the start of the new year to review their strategies and key protective measures. SOC teams understand that effective security can never be…

Read More
Michael Bovalino, Country Manager, ANZ

Why Zero Trust is the Best Security Strategy for 2023

While the concept has been in existence since the early 2000s, many organisations are yet to take the plunge. Instead, they opt to continue with legacy security measures and add additional tools as required. Taking this approach, however, can be…

Read More
Journey written art

Stop Asking if Your Organization is Secure — It’s Not

“Is my organization secure?” If you are asking that question, you are asking the wrong question. There is an important, underlying truth that the entire industry needs to acknowledge and be more transparent about; there is no such thing as…

Read More
Colorful 2023 year

2023 Cybersecurity Predictions

With the start of a new year, LogRhythm is announcing our 2023 cybersecurity predictions! This is a tradition at LogRhythm, as each year our executives reveal cyberthreats organizations across the globe may potentially face. Looking back at our 2022 and…

Read More
RT Insights Logo

Why Organizations Should Adopt the Cybersecurity Risk Optimization Approach

Historically, the concern of cyberattacks has put organizations and their IT departments on the defensive as they increase and become more complex. Organizations are investing more than ever to create a defensive security posture that attempts to safeguard every component…

Read More

“Law by Law”: Your Guide to Cybersecurity Compliance in Singapore

As Singapore continues to brand itself as a digital-first country, businesses will also have to adhere to a high cybersecurity standard to inspire confidence in all stakeholders. Ideally, companies should already be in compliance to one of the many cybersecurity…

Read More

Reducing Ransomware Risk in Healthcare

Editor’s Note: This a partnered sponsored guest blog written by Avertium. How much are you willing to pay to get your personal data back? How about hundreds and thousands of personal data records stored in your company? The impacts of…

Read More
Andrew Hollister, CISO

Cybersecurity Priorities For Water Utilities: Providing a Secure Foundation for Transformation and Automation (Page 92-23)

In this article for Smart Water Magazine, LogRhythm’s CISO Andrew Hollister shares his thoughts on how water utilities can manage and prevent cyberattacks on their systems and networks.

Read More
Help Net Security | Insights into insider threats: Detecting and monitoring abnormal user activity

Insights Into Insider Threats: Detecting and Monitoring Abnormal User Activity

Most organizations focus their threat detection and prevention strategies on external cyberthreats however internal threats are just as dangerous. LogRhythm’s CISO Andrew Hollister shared his thoughts with Help Net Security on how the attack surface for insider threats is expanding…

Read More
Helpnet Security logo

3 Major Threat Detection Methods Explained

The importance of threat detection cannot be overstated. A recent Verizon study revealed that the top discovery method (more than 50%) for breaches is in fact disclosure by the threat actor themselves after a successful compromise.

Read More
Introducing Security Spotlights

Introducing Security Spotlights

Gain the Cybersecurity Insights Needed to Reduce Noise, Prioritize Work and Quickly Secure Your Environment. Your cybersecurity needs are constantly changing as cybersecurity threats continue to evolve and increase in complexity. At LogRhythm, we are always looking to make it…

Read More
Digitalisation World Logo

A Framework First Approach for Cybersecurity

Andrew Hollister, LogRhythm CISO and VP of LogRhythm Labs, discusses the findings of a recent report, produced in association with the Ponemon Institute – covering the current threat landscape, the need for clear communications between the CISO and the CEO/board…

Read More

Understanding DDoS Attacks on US Airport Websites and Escalating Critical Infrastructure Cyberattacks

Pro-Russian hacking group Killnet has claimed credit for a series of distributed denial-of-service (DDoS) attacks executed against US airport websites on October 10. Several websites for airports across the US were affected

Read More

How to Clean up the Tool-Sprawl Mess

Editor’s Note: This a partnered sponsored guest blog written by Cadre See a problem, throw a technology at it. See another problem, throw another technology at it. According to a global survey by IBM, this mindset has led to enterprises…

Read More
cyber hacker with code

The Art and Science of Threat Hunting – A Guide to Preventing Cyberattacks

Editor’s Note: This a partnered sponsored guest blog written by Avertium. What is threat hunting? Cyber threat hunting is a proactive cybersecurity strategy that searches through networks to detect and isolate advanced threats before they present themselves. Threat hunters do…

Read More
Woman in glasses looking at computer screen

SOC Modernization: Building a Strong Foundation

Editor’s Note: This a partnered sponsored guest blog written by Cadre. The core paradigm of today’s security operation center (SOC) is having the right tools paired with the right technologies and using automation to make sense of the mountain of…

Read More