Security Tips and Tricks

Mohan Raj

Attacks on IoT: The Call to Combat Rising Cyberthreats in the Telco Space

Attacks on IoT: In today’s cyberthreat landscape, threat actors are drawn to organizations that operate within critical infrastructure sectors, including telecommunications (telco), due to the potential to cause significant damage and disturbance to critical processes that benefit ordinary people and…

Read More
Security Middle East and Africa

Cloud Security Needs to Become a Higher Priority

Mazen Dohaji, Vice President, iMETA, LogRhythm in conversation with Security Middle East and Africa talks about the evolving cybersecurity landscape and explained that with the cloud adoption gaining momentum, cloud security needs to be priority for the organizations in the region.

Read More
Michael Bovalino, Country Manager, ANZ

Five steps to protect against and recover from ransomware attacks

Ransomware attacks are on the rise and organisations of all sizes are falling victim. The attacks involve cybercriminals infecting a target’s IT infrastructure, encrypting vital data, and then demanding a ransom payment in exchange for the keys. Right now, they…

Read More

How Did We Get Here? The Past, Present, and Future of Supply Chain Risk

Watch Avertium and LogRhythm as they discuss the impact of historical supply chain attacks, what the future of supply chain risk looks like, and what you can be doing now to prevent a potential breach.

Read More
In the News

In the News [Part 1]

Read More
Credit Union building

How to Strengthen Your Credit Union Cybersecurity Program

If you go to the National Credit Union Administration (NCUA) website, the main page headline reads: “Current Geopolitical Events Increase Likelihood of Imminent Cyberattacks on Financial Institutions.” If you click through, they explain that the NCUA, CISA, the FBI, and…

Read More
The Evolution and Life of a CISO

The Evolution and Life of a CISO

Read More

How Much is Enough? A Different Cybersecurity Risk Management Approach

Historically, the fear of cyberthreats put organizations and their IT departments on the defense. So much so they still strive to design security plans that try to protect every part of their infrastructure — data centers, assets, networks — everything.…

Read More
Construction worker in a light rail tunnel

Critical Infrastructure Protection

In today’s cyberthreat landscape, threat actors are drawn to organizations that operate within critical infrastructure (CI) sectors, such as oil and gas, financial services, telecommunications, mass transportation, public healthcare, etc. When targeting legacy control systems operating within a critical infrastructure…

Read More
Continuity Central logo

Machine learning in cyber security: a structured approach

Machine learning (ML) and artificial intelligence (AI) have become frequent buzzwords in the cyber security space. Security teams have an urgent need for more automated methods for detecting threats and malicious user activity and ML offers a better future. LogRhythm…

Read More
A Look at Cyberwarfare Actions and Detection Using HermeticWiper Malware as the Example

A Look at Cyberwarfare Actions and Detection Using HermeticWiper Malware as the Example | Webinar

Read More

Advanced Persistent Threat risks: creating a ‘security-first’ environment for healthcare

Advanced Persistent Threat (APT) groups are continuing to leverage unique and sophisticated techniques to compromise healthcare organisations across Europe and the rest of the world. Over the last year, the global pandemic has raised additional interest for APT actors both…

Read More
Image of Mazen Dohaji, VP Regional Sales iMETA, LogRhythm

The Aftermath of the Rush to Digitalisation: Securing the Cloud in the Middle East

Over the past two years, an increase in digital transformation has driven the rapid adoption of cloud services across the Middle East. Recent initiatives such as UAE Vision 2021 and the adoption of smart technologies are advancing the cloud landscape…

Read More
Data Security, Digital Transformation & The Great Resignation

Data Security, Digital Transformation & The Great Resignation

Read More

‘Women bring a wealth of diverse talents to the table’ – Joanne Wong

Get to know Joanne Wong, a former lawyer who is now Vice President, International Marketing (APJ & EMEA) at LogRhythm. TECHx: What inspired you to pursue a career in technology? Joanne: While I am a lawyer by training, my passion…

Read More

Why is SS7 still a security threat?

Signalling System 7 (SS7) is still full of holes – what are operators doing about it asks Kate O’Flaherty? SS7 is still full of security holes, despite attempts to police the age-old signalling protocol. In 2017, hackers exploited SS7 as…

Read More

Navigating Modern Day SOC Challenges

Read More
Racing Against Ransomware Episode 2

Racing Against Ransomware [Episode 2]: Hacker’s perspective & how you can reduce dwell time

Read More