100-day plan: What European nations can do to protect utilities
Secure and reliable utility operations are vital to national security across the globe. The frequency of attacks on critical infrastructure is rapidly rising, with U.S. data on ransomware attacks on critical infrastructure collected by Temple University showing an increase from…
Read More
August 2, 2021
Lessons from Our Zero Trust Journey: Successes, Failures, and Dodging Pitfalls
Read More
July 28, 2021
Detection and Response Strategies for Cloud Security Incidents
Read More
July 28, 2021
Cybersecurity and Financial Services: Automate, Innovate and Deliver Proactive Security
Financial cybersecurity in the Middle East is becoming increasingly complex to navigate with the ever-evolving threat landscape. The changing nature of cyberattacks within this sector is driving the need for financial institutions to prioritize their cybersecurity efforts. Organizations must ensure…
Read More
July 27, 2021
The Entire Organization is Responsible for Cybersecurity
“The data indicates that there is a disconnect between decision-makers and cybersecurity teams. There needs to be consistent communication, whereas, at the moment, over 40% of cybersecurity leaders only report to the board when a breach has happened. At that…
Read More
July 27, 2021
6 Steps to Using the LogRhythm API
Posted by: Dan Crossley
This article will show you how to use the LogRhythm API. It is important to understand what the API can do and how you can use it. This will help you gain better value from your SIEM deployment. A Practical Use…
Read More
July 22, 2021
Data Science and Machine Learning in cybersecurity
Read More
July 22, 2021
The evolution of SIEM: An introduction into XDR
Read More
July 22, 2021
Lessons from our Zero Trust journey: Successes, failures & dodging pitfalls
Read More
July 21, 2021
Reducing corporate security risk with next-gen security operations
Read More
July 14, 2021
Aligning Security with Business Objectives
Posted by: Kelsey Gast
Aligning security with business objectives should be a top priority, but that is not always the case for many organizations. According to research, 93% of security leaders do not report to the CEO, yet 60% say they should to provide…
Read More
June 22, 2021
Staying agile and cyber resilient in a virtual world
Read More
May 28, 2021
Watch this Webinar to Minimize Your Ransomware Impact
Read More
May 25, 2021
Four Steps to Building a Strong IT Partnership for Your Zero Trust Implementation
Posted by: Kelsey Gast
Implementing a Zero Trust model is becoming a leading security strategy for organizations across the globe, but it requires fundamental shifts in mindset and major transitions in the deployment, use, and management of security technologies. When mapping your Zero Trust ecosystem,…
Read More
May 18, 2021
IDC In Conversation – Security Operations Strategy: The Fundamentals to Achieving Cyber Resilience and Efficacy
Posted by: Joanne Wong
Cathy Huang, Associate Research Director of IDC Asia/Pacific’s (AP) Services and Security Practice, caught up with Joanne Wong and Leonardo Hutabarat, to discuss the role and differentiation of security operations platforms and how it drives the overall enterprise security efficacy…
Read More
April 23, 2021
Increase Cyber Resilience with Zero Trust
Read More
April 15, 2021
How Federal Agencies Can Detect and Block Insider Threats
Read More
March 23, 2021
Centralizing Process Creation Events with a SIEM
Posted by: Dan Crossley
How Process Creation Events Can Be Centralized for Ease of Analysis Process creation events are written to the Windows Event Log on the local endpoint where they are generated. This raises an obvious issue for defenders looking to proactively review these…
Read More
March 15, 2021