Security Tips and Tricks

RhythmWorld Security Conference 2021 banner

3 Reasons to Attend RhythmWorld 2021

RhythmWorld is back and better than ever before! LogRhythm’s fifth annual cybersecurity conference starts Tuesday, October 12th, and we’ve already surpassed last year’s record-breaking attendance numbers. We are taking this year’s RhythmWorld agenda to the next level — the schedule…

Read More
Computer with a lock on the keypad

Cyber Kill Chain Steps and How to Defend Against APTs

The Cyber Kill Chain® methodology was developed by the military defense firm, Lockheed Martin, to address cyberattacks by identifying the pattern and behavior of cybercriminals as they carry out an attack. These actions are referred to as cyber kill phases.[1]…

Read More
Screen shot of GitHub showing LogRhythm.Tools information.

Automation Use Cases Using LogRhythm.Tools

LogRhythm.Tools is a PowerShell framework which acts as a wrapper for the LogRhythm API. This simplifies interactions with the LogRhythm API because you only need to run a PowerShell cmdlet to call an API function, rather than a direct interaction with your own…

Read More
14 Cloud Usage Costs That Could Bust Your Tech Budget

Why Your CISO Should Report Directly To The CEO

Security leaders lack the necessary organizational visibility and influence to effectively build and mature their security programs. To overcome these barriers, security leaders such as CISOs and CIOs must report directly to the CEO. This reporting structure allows the CISO to directly communicate potential risks to…

Read More
United States White House

Executive Order on Zero Trust — What it Means for Federal Agencies

While Ronald Reagan was president during the height of the Cold War in the 1980s, he popularized an old Russian phrase that was translated as “trust, but verify.” Reagan invoked this phrase to emphasize the extensive verification procedures that would…

Read More
Toolbox Security Logo

4 Tips To Get Buy-in From Your IT Team for Zero Trust

Accelerated digital transformation efforts and workforce shifts amid COVID-19 have caused the network perimeter of many organizations to evolve and become challenging to define. As a result, enterprises are increasingly turning to a Zero Trust security model to validate authentication…

Read More
U.S. Capital building

Keeping Up with U.S. Cybersecurity Regulatory Compliance Requirements

2021 has provided no shortage of security events and incidents. The increasing frequency and severity of supply chain and ransomware attacks have put pressure on governments and various regulators to act, which has created a lot of noise and uncertainty…

Read More

In House Warrior: The Evolving Discipline of Cybersecurity

James Carder speaks with podcast hosts about the ever-evolving cyber hygiene required in a time of sophisticated cyberattacks, the latest thinking on ransomware, the unique needs of law firms and legal departments, and how to prepare for the threats ahead.

Read More

Taking charge of cyberthreats with a modern approach

Andrew Hollister discusses one of cybersecurity’s most recent trends which is gaining traction across the board. He explains how XDR technology can be useful for organisations and the benefits it can bring.

Read More

How to foster collaboration with the IT team for a successful zero trust implementation

Security teams cannot deploy elements of zero trust on their own. They must enlist IT to help deploy software and stay on top of vulnerabilities and patches. Fortifying this key relationship will help security teams carry out the efficient transformation…

Read More

Harnessing security and compliance automation for the financial sector in Middle East

Mazen Dohaji discusses the need for the regional banks and financial institutions to simplify their processes with compliance automation as there is a growing requirement for detection and response to weaknesses in authorizations that could put banks, payment transfer systems and financial…

Read More
14 Cloud Usage Costs That Could Bust Your Tech Budget

Most Surveyed Americans Lack Confidence In Government To Protect Them From Cyberattacks

The latest victim of the increasing number of cyberattacks on U.S. businesses and infrastructure is the trust Americans have in their government to protect them from future attacks. There are 10 ways to help restore that trust.

Read More

Detecting Ransomware Before It’s Too Late Using MITRE ATT&CK

Read More
Beta News

How security teams can build a strong IT partnership for zero trust implementation [Q&A]

As the enterprise IT landscape has become more complex, security is no longer a matter of simply securing the network perimeter. The cloud and remote workers now have to be part of the equation too.

Read More
SiliconANGLE Logo

Venture capital firm Advanced Technology Ventures struck by ransomware

Venture capital firm Advanced Technology Ventures has been struck by a ransomware attack that has resulted in the theft of personal information relating to its investors.

Read More

Top strategies for a secure and hybrid workplace

Organizations in the region need to implement tighter security controls to build resilience in a work from anywhere world to build resiliency into their operations: Mazen Dohaji, LogRhythm. Over the last 12 months, organizations across the Middle East have been…

Read More
A phone screen accessing Amazon's website

Detecting Attacks on Amazon Web Services (AWS)

Amazon Web Services (AWS) is well known for its shared responsibility model: AWS is responsible for fixing the flaws in the infrastructure and its customers are responsible for configuring and adequately protecting their own data using access management or other…

Read More

Kaseya ransomware attack: The knock-on effect of the cyberattack on managed service providers

Ransomware continues to be one of the top threats to Managed Service Providers (MSPs), critical infrastructure organizations and government agencies at all levels. As threat actors continue to evolve their strategies and increase demands, organizations are feeling the pressure of…

Read More