Security Tips and Tricks

Racing Against Ransomware Episode 2

Racing Against Ransomware [Episode 2]: Hacker’s perspective & how you can reduce dwell time

Read More
Security Today logo

The Rush to Digitalization

Over the last year, there has been unwavering focus on digital transformation driven by the need for greater connectivity. Despite the new levels of innovation being achieved by businesses worldwide, organisations often overlook the need to secure new technologies with…

Read More
Log4Shell Vulnerability

Impact and Insights on Log4Shell Vulnerability

 The recently-disclosed “Log4Shell” vulnerabilities in Apache Log4j 2 had a major impact in the cybersecurity world due to the severity of the exploit and the incredibly widespread use of Log4j 2 in modern software. In this webinar the LogRhythm…

Read More
Joanne Wong, VP of International Marketing

How IT security can shift from being tactical to strategic

Within many businesses today, IT security is regarded as a necessary evil. Often complex and usually expensive, it’s viewed as something that consumes resources that could readily be invested elsewhere.

Read More
Joanne Wong_landscape_thumbnail

Eight steps to achieve cyber resilience in the new world of work

The huge shift in work practices that has taken place across Australia during the past two years has shifted the goal posts for security professionals. Measures that worked well in the past now need urgent review and amendment, writes Joanne…

Read More
Racing Against Ransomware Episode 1

Racing Against Ransomware [Episode 1]: Hacker’s perspective & how you can reduce dwell time

Read More
Alphabet Soup: Making Sense of XDR, EDR, NDR and SIEM

Alphabet Soup: Making Sense of XDR, EDR, NDR and SIEM

Read More
Glasses magnifying a computer screen.

2022 Cybersecurity Predictions

As cybersecurity professionals, it’s critical to stay on top of potential cyberthreats that your organization may face to better prepare and build a proactive defense. Cybercrime in 2021 highlighted new trends with threats and breaches that have escalated the need…

Read More
Image of Mazen Dohaji, VP Regional Sales iMETA, LogRhythm

Make cybersecurity a core business priority

As digital transformation is picking up momentum and expanding fast, there could be an increase in phishing and ransomware attacks in the region. In that context, it is imperative that cybersecurity is made the core business priority, says Mazen Dohaji,…

Read More

Enriching MITRE ATT&CK Techniques for Better Threat Detection

Read More
Government building

The Future of Government Cybersecurity

In 2021, we’ve witnessed cybercriminals infiltrate government networks, incessant ransomware lockdown operational technology, and advanced persistent threats make national headlines. Microsoft’s President Brad Smith recently stated, “So there’s been an ongoing conversation in the cybersecurity community. ‘Why aren’t organizations doing…

Read More
Threat Hunting with LogRhythm featured image

Threat Hunting with LogRhythm: Practical Tips for Security Analysts

Read More

CISOs on the front line: What’s ahead for cybersecurity in 2022

Cybersecurity is ever-evolving. For CISOs to continue tackling the threat landscape successfully, they must implement more sophisticated defense strategies in 2022 to mirror the increasing sophistication of the methods used by hackers. Kev Eley, Vice President Sales, Europe at LogRhythm,…

Read More
Two men working with code on computers

AWS Defense Evasion and Centralized Multi-Account Logging

Amazon Web Services (AWS) is a widely known cloud service provider, but organizations that use AWS products face unique cybersecurity challenges. Leveraging techniques that reduce risk against new cloud security challenges will help you stay ahead of threats across your…

Read More
Image of Kev Eley to the left and the helpnet and LogRhythm logo's to the right, cybersecurity threats and challenges in 2022

2022: threats and future cybersecurity challenges

How do you ensure your business thrives, not just survives in cybersecurity, with its various evolving threats and challenges? To help get you started, Kev Eley, VP of Sales, Europe, has taken a deep dive into the potential 2022 threat…

Read More

The Evolution and Life of a CISO

Read More

Understanding your SIEM Investment – Featuring Special Guests from Forrester

Learn about building a business case for your SIEM with LogRhythm and Forrester special guests.

Read More
Theresa Payton cover image

Theresa Payton’s Cybersecurity Tips and Predictions

The repercussions and liability of cybercrime continuously threaten organizations. With so much at stake, business leaders and security professionals must initiate meaningful change to overcome present-day challenges in the cybersecurity industry. A recent study by Stanford University has shown that…

Read More