3 Reasons to Attend RhythmWorld 2021
RhythmWorld is back and better than ever before! LogRhythm’s fifth annual cybersecurity conference starts Tuesday, October 12th, and we’ve already surpassed last year’s record-breaking attendance numbers. We are taking this year’s RhythmWorld agenda to the next level — the schedule…
Read More
September 27, 2021
Cyber Kill Chain Steps and How to Defend Against APTs
The Cyber Kill Chain® methodology was developed by the military defense firm, Lockheed Martin, to address cyberattacks by identifying the pattern and behavior of cybercriminals as they carry out an attack. These actions are referred to as cyber kill phases.[1]…
Read More
September 13, 2021
Automation Use Cases Using LogRhythm.Tools
Posted by: Dan Crossley
LogRhythm.Tools is a PowerShell framework which acts as a wrapper for the LogRhythm API. This simplifies interactions with the LogRhythm API because you only need to run a PowerShell cmdlet to call an API function, rather than a direct interaction with your own…
Read More
September 9, 2021
Why Your CISO Should Report Directly To The CEO
Security leaders lack the necessary organizational visibility and influence to effectively build and mature their security programs. To overcome these barriers, security leaders such as CISOs and CIOs must report directly to the CEO. This reporting structure allows the CISO to directly communicate potential risks to…
Read More
September 8, 2021
Executive Order on Zero Trust — What it Means for Federal Agencies
Posted by: Scott Monfredo
While Ronald Reagan was president during the height of the Cold War in the 1980s, he popularized an old Russian phrase that was translated as “trust, but verify.” Reagan invoked this phrase to emphasize the extensive verification procedures that would…
Read More
September 3, 2021
4 Tips To Get Buy-in From Your IT Team for Zero Trust
Accelerated digital transformation efforts and workforce shifts amid COVID-19 have caused the network perimeter of many organizations to evolve and become challenging to define. As a result, enterprises are increasingly turning to a Zero Trust security model to validate authentication…
Read More
August 31, 2021
Keeping Up with U.S. Cybersecurity Regulatory Compliance Requirements
Posted by: Kyle Dimitt
2021 has provided no shortage of security events and incidents. The increasing frequency and severity of supply chain and ransomware attacks have put pressure on governments and various regulators to act, which has created a lot of noise and uncertainty…
Read More
August 26, 2021
In House Warrior: The Evolving Discipline of Cybersecurity
James Carder speaks with podcast hosts about the ever-evolving cyber hygiene required in a time of sophisticated cyberattacks, the latest thinking on ransomware, the unique needs of law firms and legal departments, and how to prepare for the threats ahead.
Read More
August 19, 2021
Taking charge of cyberthreats with a modern approach
Andrew Hollister discusses one of cybersecurity’s most recent trends which is gaining traction across the board. He explains how XDR technology can be useful for organisations and the benefits it can bring.
Read More
August 17, 2021
How to foster collaboration with the IT team for a successful zero trust implementation
Security teams cannot deploy elements of zero trust on their own. They must enlist IT to help deploy software and stay on top of vulnerabilities and patches. Fortifying this key relationship will help security teams carry out the efficient transformation…
Read More
August 16, 2021
Harnessing security and compliance automation for the financial sector in Middle East
Mazen Dohaji discusses the need for the regional banks and financial institutions to simplify their processes with compliance automation as there is a growing requirement for detection and response to weaknesses in authorizations that could put banks, payment transfer systems and financial…
Read More
August 12, 2021
Most Surveyed Americans Lack Confidence In Government To Protect Them From Cyberattacks
The latest victim of the increasing number of cyberattacks on U.S. businesses and infrastructure is the trust Americans have in their government to protect them from future attacks. There are 10 ways to help restore that trust.
Read More
August 12, 2021
Detecting Ransomware Before It’s Too Late Using MITRE ATT&CK
Read More
August 11, 2021
How security teams can build a strong IT partnership for zero trust implementation [Q&A]
As the enterprise IT landscape has become more complex, security is no longer a matter of simply securing the network perimeter. The cloud and remote workers now have to be part of the equation too.
Read More
August 10, 2021
Venture capital firm Advanced Technology Ventures struck by ransomware
Venture capital firm Advanced Technology Ventures has been struck by a ransomware attack that has resulted in the theft of personal information relating to its investors.
Read More
August 5, 2021
Top strategies for a secure and hybrid workplace
Organizations in the region need to implement tighter security controls to build resilience in a work from anywhere world to build resiliency into their operations: Mazen Dohaji, LogRhythm. Over the last 12 months, organizations across the Middle East have been…
Read More
August 5, 2021
Detecting Attacks on Amazon Web Services (AWS)
Posted by: Ashok Chokalingam
Amazon Web Services (AWS) is well known for its shared responsibility model: AWS is responsible for fixing the flaws in the infrastructure and its customers are responsible for configuring and adequately protecting their own data using access management or other…
Read More
August 4, 2021
Kaseya ransomware attack: The knock-on effect of the cyberattack on managed service providers
Ransomware continues to be one of the top threats to Managed Service Providers (MSPs), critical infrastructure organizations and government agencies at all levels. As threat actors continue to evolve their strategies and increase demands, organizations are feeling the pressure of…
Read More
August 2, 2021