Racing Against Ransomware [Episode 2]: Hacker’s perspective & how you can reduce dwell time
March 2, 2022
March 2, 2022
Over the last year, there has been unwavering focus on digital transformation driven by the need for greater connectivity. Despite the new levels of innovation being achieved by businesses worldwide, organisations often overlook the need to secure new technologies with…
Read MoreMarch 2, 2022
The recently-disclosed “Log4Shell” vulnerabilities in Apache Log4j 2 had a major impact in the cybersecurity world due to the severity of the exploit and the incredibly widespread use of Log4j 2 in modern software. In this webinar the LogRhythm…
Read MoreFebruary 24, 2022
Within many businesses today, IT security is regarded as a necessary evil. Often complex and usually expensive, it’s viewed as something that consumes resources that could readily be invested elsewhere.
Read MoreFebruary 17, 2022
The huge shift in work practices that has taken place across Australia during the past two years has shifted the goal posts for security professionals. Measures that worked well in the past now need urgent review and amendment, writes Joanne…
Read MoreFebruary 17, 2022
February 16, 2022
As cybersecurity professionals, it’s critical to stay on top of potential cyberthreats that your organization may face to better prepare and build a proactive defense. Cybercrime in 2021 highlighted new trends with threats and breaches that have escalated the need…
Read MoreJanuary 28, 2022
As digital transformation is picking up momentum and expanding fast, there could be an increase in phishing and ransomware attacks in the region. In that context, it is imperative that cybersecurity is made the core business priority, says Mazen Dohaji,…
Read MoreJanuary 14, 2022
In 2021, we’ve witnessed cybercriminals infiltrate government networks, incessant ransomware lockdown operational technology, and advanced persistent threats make national headlines. Microsoft’s President Brad Smith recently stated, “So there’s been an ongoing conversation in the cybersecurity community. ‘Why aren’t organizations doing…
Read MoreDecember 27, 2021
Cybersecurity is ever-evolving. For CISOs to continue tackling the threat landscape successfully, they must implement more sophisticated defense strategies in 2022 to mirror the increasing sophistication of the methods used by hackers. Kev Eley, Vice President Sales, Europe at LogRhythm,…
Read MoreDecember 15, 2021
Amazon Web Services (AWS) is a widely known cloud service provider, but organizations that use AWS products face unique cybersecurity challenges. Leveraging techniques that reduce risk against new cloud security challenges will help you stay ahead of threats across your…
Read MoreDecember 13, 2021
How do you ensure your business thrives, not just survives in cybersecurity, with its various evolving threats and challenges? To help get you started, Kev Eley, VP of Sales, Europe, has taken a deep dive into the potential 2022 threat…
Read MoreDecember 6, 2021
Learn about building a business case for your SIEM with LogRhythm and Forrester special guests.
Read MoreNovember 22, 2021
The repercussions and liability of cybercrime continuously threaten organizations. With so much at stake, business leaders and security professionals must initiate meaningful change to overcome present-day challenges in the cybersecurity industry. A recent study by Stanford University has shown that…
Read MoreNovember 19, 2021