Attacks on IoT: The Call to Combat Rising Cyberthreats in the Telco Space
Attacks on IoT: In today’s cyberthreat landscape, threat actors are drawn to organizations that operate within critical infrastructure sectors, including telecommunications (telco), due to the potential to cause significant damage and disturbance to critical processes that benefit ordinary people and…
Read More
April 28, 2022
Cloud Security Needs to Become a Higher Priority
Mazen Dohaji, Vice President, iMETA, LogRhythm in conversation with Security Middle East and Africa talks about the evolving cybersecurity landscape and explained that with the cloud adoption gaining momentum, cloud security needs to be priority for the organizations in the region.
Read More
April 28, 2022
Five steps to protect against and recover from ransomware attacks
Ransomware attacks are on the rise and organisations of all sizes are falling victim. The attacks involve cybercriminals infecting a target’s IT infrastructure, encrypting vital data, and then demanding a ransom payment in exchange for the keys. Right now, they…
Read More
April 28, 2022
How Did We Get Here? The Past, Present, and Future of Supply Chain Risk
Watch Avertium and LogRhythm as they discuss the impact of historical supply chain attacks, what the future of supply chain risk looks like, and what you can be doing now to prevent a potential breach.
Read More
April 26, 2022
How to Strengthen Your Credit Union Cybersecurity Program
If you go to the National Credit Union Administration (NCUA) website, the main page headline reads: “Current Geopolitical Events Increase Likelihood of Imminent Cyberattacks on Financial Institutions.” If you click through, they explain that the NCUA, CISA, the FBI, and…
Read More
April 21, 2022
The Evolution and Life of a CISO
Read More
April 13, 2022
How Much is Enough? A Different Cybersecurity Risk Management Approach
Historically, the fear of cyberthreats put organizations and their IT departments on the defense. So much so they still strive to design security plans that try to protect every part of their infrastructure — data centers, assets, networks — everything.…
Read More
March 31, 2022
Critical Infrastructure Protection
In today’s cyberthreat landscape, threat actors are drawn to organizations that operate within critical infrastructure (CI) sectors, such as oil and gas, financial services, telecommunications, mass transportation, public healthcare, etc. When targeting legacy control systems operating within a critical infrastructure…
Read More
March 28, 2022
Machine learning in cyber security: a structured approach
Machine learning (ML) and artificial intelligence (AI) have become frequent buzzwords in the cyber security space. Security teams have an urgent need for more automated methods for detecting threats and malicious user activity and ML offers a better future. LogRhythm…
Read More
March 25, 2022
A Look at Cyberwarfare Actions and Detection Using HermeticWiper Malware as the Example | Webinar
Read More
March 17, 2022
Advanced Persistent Threat risks: creating a ‘security-first’ environment for healthcare
Advanced Persistent Threat (APT) groups are continuing to leverage unique and sophisticated techniques to compromise healthcare organisations across Europe and the rest of the world. Over the last year, the global pandemic has raised additional interest for APT actors both…
Read More
March 17, 2022
The Aftermath of the Rush to Digitalisation: Securing the Cloud in the Middle East
Over the past two years, an increase in digital transformation has driven the rapid adoption of cloud services across the Middle East. Recent initiatives such as UAE Vision 2021 and the adoption of smart technologies are advancing the cloud landscape…
Read More
March 14, 2022
Data Security, Digital Transformation & The Great Resignation
Read More
March 10, 2022
‘Women bring a wealth of diverse talents to the table’ – Joanne Wong
Get to know Joanne Wong, a former lawyer who is now Vice President, International Marketing (APJ & EMEA) at LogRhythm. TECHx: What inspired you to pursue a career in technology? Joanne: While I am a lawyer by training, my passion…
Read More
March 8, 2022
Why is SS7 still a security threat?
Signalling System 7 (SS7) is still full of holes – what are operators doing about it asks Kate O’Flaherty? SS7 is still full of security holes, despite attempts to police the age-old signalling protocol. In 2017, hackers exploited SS7 as…
Read More
March 8, 2022
Navigating Modern Day SOC Challenges
Read More
March 7, 2022
Racing Against Ransomware [Episode 2]: Hacker’s perspective & how you can reduce dwell time
Read More
March 2, 2022