Security Tips and Tricks

Andrew Hollister, CISO

Zero Trust is Emerging as a Leading Security Strategy

Whilst the concepts of Zero Trust were articulated more than a decade ago, with rapid shift to remote working, digital transformation and demand for Cloud services, Zero Trust is finally gaining the attention it deserves and emerging as a leading…

Read More
The Great Exfiltration: Employees Leave and Take the Keys

The Great Exfiltration: Employees Leave and Take the Keys

According to the 2022 Ponemon Institute Cost of Insider Threats: Global Report, insider threat incidents have risen 44% over the past two years, with costs per incident up more than a third to $15.38 million. Among the reasons for this…

Read More
Kev Eley, VP of Sales, Europe

Detecting and Responding to Threats Fast

Detecting and Responding to Threats Fast: Building a SOC with Limited Resources Over the last 18 months, the need for greater cybersecurity across the globe has risen due to a significant shift to remote working and more vulnerable security infrastructure…

Read More
Man working on desktops in operations center

Leverage Your SIEM as Part of Your Zero Trust Strategy

Editor’s Note: This a partnered sponsored guest blog written by Avertium. Continuous monitoring is one of the most important facets of any Zero Trust architecture. The level of trust a system has in any user, application, or data flow may…

Read More
The Evolution of NDR on demand image

The Evolution of NDR: Defending and Protecting Critical Data and Infrastructure

Read More
Mike Dalgleish

Partner Training Makes All the Difference

Partner Training Makes All the Difference “While initiating and building training programs mostly lies with the vendors, this doesn’t absolve partners or distributors of responsibility in ensuring their employees are up-to-date with new technological improvements and training,” says Michael Dalgleish,…

Read More
Kev Eley, VP of Sales, Europe

How to Build a Targeted and Sustainable Cybersecurity Budget

How Much is Enough? How to Build a Targeted and Sustainable Cybersecurity Budget Ensuring cybersecurity investments align with the business’ goals is a key element of success, however, managing the two simultaneously can be extremely challenging. Kev Eley, Vice President…

Read More
Mazen Dohaji headshot

The Need for Predictive Tools is Greater than Ever

The Need for Predictive Tools is Greater than Ever Cybersecurity is undergoing massive shifts in technology and ML can play a vital role in this by capturing insights through its predictive capabilities. Predictive analytics brings a new level of visibility…

Read More
Jonathan Zulberg

Staying Ahead of Evolving Cyber Threats

Staying Ahead of Evolving Cyber Threats “Organizations that combine comprehensive visibility, continuous monitoring, advanced analytics, and efficient incident response orchestration are well-positioned to identify and respond to the early indicators of an intruder and rapidly neutralize the threat,” Jonathan Zulberg,…

Read More
U.S. government building

Implementing the OMB 21-31 Memorandum

The Russia–Ukraine conflict has significantly intensified the cyberthreat landscape. As state-sponsored threat actors collaborate with financially-motivated cybercriminals to launch targeted cyberattacks against critical infrastructures, the cyberthreat landscape has become a free-for-all arena. As a result, the FBI and the Cybersecurity…

Read More
Enterprise IT World logo

Ten Measures to Strengthen the Security Posture

Ten Measures to Strengthen the Security Posture Cyber threats have increased significantly in the wake of increased connectivity and organizations must adopt comprehensive security measures to defend the business. The world is witnessing an unprecedented rate of data generation—by 2025…

Read More
Scalable Automated Network Threat Detection in Action

Scalable, Automated Network Threat Detection in Action

Read More
American Flag on flag pole

Securing U.S. Cleared Defense Contractors Against Russian State-Sponsored Attacks

State-sponsored attacks frequently target numerous U.S. Cleared Defense Contractor (CDC) networks to obtain critical information and other sensitive assets related to the U.S. government’s national security and defense capabilities. For state-sponsored threat actors, gaining access to highly classified information allows…

Read More
Helpnet Security logo

Training employees to identify a spear phishing attack

Nothing Personal: Training Employees to Identify a Spear Phishing Attack. Phishing attacks began years ago as simple spam, designed to trick recipients into visiting sites and becoming customers. In the meantime, they have morphed into a worldwide criminal industry. In…

Read More
The Fast Mode logo

Cybersecurity in the IoT World

Cybersecurity in the IoT World: How Telcos Can Secure Critical Infrastructure Against New Threats Over the last year, threat actors have launched a series of major attacks on critical infrastructure, an industry fast becoming one of the most targeted by…

Read More
EDR, NDR, XDR, and SIEM cover image

A Guide to EDR, NDR, XDR, and SIEM

As the ever-increasing list of cybersecurity acronyms and vernacular grows, what cybersecurity tools are truly best for your team and meet your organization’s needs? To make sense of it all, let’s dive into security technologies used in the market today…

Read More

Get to know LogRhythm’s Advanced Analytics UEBA | Webinar

Read More
Log4Shell Vulnerability

Impact and Insights on Log4Shell Vulnerability

Read More