Security Tips and Tricks

100-day plan: What European nations can do to protect utilities

Secure and reliable utility operations are vital to national security across the globe. The frequency of attacks on critical infrastructure is rapidly rising, with U.S. data on ransomware attacks on critical infrastructure collected by Temple University showing an increase from…

Read More

Lessons from Our Zero Trust Journey: Successes, Failures, and Dodging Pitfalls

Read More

Detection and Response Strategies for Cloud Security Incidents

Read More

Cybersecurity and Financial Services: Automate, Innovate and Deliver Proactive Security

Financial cybersecurity in the Middle East is becoming increasingly complex to navigate with the ever-evolving threat landscape. The changing nature of cyberattacks within this sector is driving the need for financial institutions to prioritize their cybersecurity efforts. Organizations must ensure…

Read More
it security wire

The Entire Organization is Responsible for Cybersecurity

“The data indicates that there is a disconnect between decision-makers and cybersecurity teams. There needs to be consistent communication, whereas, at the moment, over 40% of cybersecurity leaders only report to the board when a breach has happened. At that…

Read More
woman looking at computer in home office

6 Steps to Using the LogRhythm API

This article will show you how to use the LogRhythm API. It is important to understand what the API can do and how you can use it. This will help you gain better value from your SIEM deployment. A Practical Use…

Read More

Data Science and Machine Learning in cybersecurity

Read More

The evolution of SIEM: An introduction into XDR

Read More

Lessons from our Zero Trust journey: Successes, failures & dodging pitfalls

Read More

Reducing corporate security risk with next-gen security operations

Read More
Business woman presenting to an executive

Aligning Security with Business Objectives

Aligning security with business objectives should be a top priority, but that is not always the case for many organizations. According to research, 93% of security leaders do not report to the CEO, yet 60% say they should to provide…

Read More

Staying agile and cyber resilient in a virtual world

Read More

Watch this Webinar to Minimize Your Ransomware Impact

Read More
Woman working together while looking at a computer screen

Four Steps to Building a Strong IT Partnership for Your Zero Trust Implementation

Implementing a Zero Trust model is becoming a leading security strategy for organizations across the globe, but it requires fundamental shifts in mindset and major transitions in the deployment, use, and management of security technologies. When mapping your Zero Trust ecosystem,…

Read More
Automated response on adding playbook with LogRhythm

IDC In Conversation – Security Operations Strategy: The Fundamentals to Achieving Cyber Resilience and Efficacy

Cathy Huang, Associate Research Director of IDC Asia/Pacific’s (AP) Services and Security Practice, caught up with Joanne Wong and Leonardo Hutabarat, to discuss the role and differentiation of security operations platforms and how it drives the overall enterprise security efficacy…

Read More

Increase Cyber Resilience with Zero Trust

Read More

How Federal Agencies Can Detect and Block Insider Threats

Read More
Employee Centralizing Process Creation Events with a SIEM

Centralizing Process Creation Events with a SIEM

How Process Creation Events Can Be Centralized for Ease of Analysis Process creation events are written to the Windows Event Log on the local endpoint where they are generated. This raises an obvious issue for defenders looking to proactively review these…

Read More