Zero Trust is Emerging as a Leading Security Strategy
Whilst the concepts of Zero Trust were articulated more than a decade ago, with rapid shift to remote working, digital transformation and demand for Cloud services, Zero Trust is finally gaining the attention it deserves and emerging as a leading…
Read More
July 11, 2022
The Great Exfiltration: Employees Leave and Take the Keys
According to the 2022 Ponemon Institute Cost of Insider Threats: Global Report, insider threat incidents have risen 44% over the past two years, with costs per incident up more than a third to $15.38 million. Among the reasons for this…
Read More
July 8, 2022
Detecting and Responding to Threats Fast
Detecting and Responding to Threats Fast: Building a SOC with Limited Resources Over the last 18 months, the need for greater cybersecurity across the globe has risen due to a significant shift to remote working and more vulnerable security infrastructure…
Read More
July 1, 2022
Leverage Your SIEM as Part of Your Zero Trust Strategy
Editor’s Note: This a partnered sponsored guest blog written by Avertium. Continuous monitoring is one of the most important facets of any Zero Trust architecture. The level of trust a system has in any user, application, or data flow may…
Read More
June 21, 2022
The Evolution of NDR: Defending and Protecting Critical Data and Infrastructure
Read More
June 17, 2022
Partner Training Makes All the Difference
Partner Training Makes All the Difference “While initiating and building training programs mostly lies with the vendors, this doesn’t absolve partners or distributors of responsibility in ensuring their employees are up-to-date with new technological improvements and training,” says Michael Dalgleish,…
Read More
June 15, 2022
How to Build a Targeted and Sustainable Cybersecurity Budget
How Much is Enough? How to Build a Targeted and Sustainable Cybersecurity Budget Ensuring cybersecurity investments align with the business’ goals is a key element of success, however, managing the two simultaneously can be extremely challenging. Kev Eley, Vice President…
Read More
June 14, 2022
The Need for Predictive Tools is Greater than Ever
The Need for Predictive Tools is Greater than Ever Cybersecurity is undergoing massive shifts in technology and ML can play a vital role in this by capturing insights through its predictive capabilities. Predictive analytics brings a new level of visibility…
Read More
June 7, 2022
Staying Ahead of Evolving Cyber Threats
Staying Ahead of Evolving Cyber Threats “Organizations that combine comprehensive visibility, continuous monitoring, advanced analytics, and efficient incident response orchestration are well-positioned to identify and respond to the early indicators of an intruder and rapidly neutralize the threat,” Jonathan Zulberg,…
Read More
May 26, 2022
Implementing the OMB 21-31 Memorandum
The Russia–Ukraine conflict has significantly intensified the cyberthreat landscape. As state-sponsored threat actors collaborate with financially-motivated cybercriminals to launch targeted cyberattacks against critical infrastructures, the cyberthreat landscape has become a free-for-all arena. As a result, the FBI and the Cybersecurity…
Read More
May 25, 2022
Ten Measures to Strengthen the Security Posture
Ten Measures to Strengthen the Security Posture Cyber threats have increased significantly in the wake of increased connectivity and organizations must adopt comprehensive security measures to defend the business. The world is witnessing an unprecedented rate of data generation—by 2025…
Read More
May 24, 2022
Scalable, Automated Network Threat Detection in Action
Read More
May 13, 2022
Securing U.S. Cleared Defense Contractors Against Russian State-Sponsored Attacks
State-sponsored attacks frequently target numerous U.S. Cleared Defense Contractor (CDC) networks to obtain critical information and other sensitive assets related to the U.S. government’s national security and defense capabilities. For state-sponsored threat actors, gaining access to highly classified information allows…
Read More
May 9, 2022
Training employees to identify a spear phishing attack
Nothing Personal: Training Employees to Identify a Spear Phishing Attack. Phishing attacks began years ago as simple spam, designed to trick recipients into visiting sites and becoming customers. In the meantime, they have morphed into a worldwide criminal industry. In…
Read More
May 9, 2022
Cybersecurity in the IoT World
Cybersecurity in the IoT World: How Telcos Can Secure Critical Infrastructure Against New Threats Over the last year, threat actors have launched a series of major attacks on critical infrastructure, an industry fast becoming one of the most targeted by…
Read More
May 9, 2022
A Guide to EDR, NDR, XDR, and SIEM
Posted by: Kelsey Gast
As the ever-increasing list of cybersecurity acronyms and vernacular grows, what cybersecurity tools are truly best for your team and meet your organization’s needs? To make sense of it all, let’s dive into security technologies used in the market today…
Read More
May 2, 2022
Get to know LogRhythm’s Advanced Analytics UEBA | Webinar
Read More
April 28, 2022
Impact and Insights on Log4Shell Vulnerability
Read More
April 28, 2022