Strategies to Safeguard the Finance Industry Against Deepfake Onslaught
Posted by: Kevin D. Kirkwood
With the rise of deepfake technology, the financial sector faces a new and growing threat landscape, as malicious actors exploit artificial intelligence (AI)-generated content to perpetrate fraud and social engineering attacks. However, according to a Pew Research study, 61% of…
Read MoreJuly 9, 2024
CISO Panel: How Security Teams Are Evolving Their Strategies in 2024
Posted by: Andrew Hollister
The cybersecurity industry is experiencing significant shifts in 2024. LogRhythm’s State of the Security Team global research reveals a whopping 95% of organizations have adjusted their security strategy this year. These changes are primarily driven by artificial intelligence (AI), regulatory…
Read MoreJuly 3, 2024
How to Ensure Your Data is Ready for an AI-Driven SOC
Posted by: Matt Willems
In 2024, artificial intelligence (AI) has prompted 65% of organizations to evolve their security strategies. Across the globe, this technological revolution has pushed security and business leaders to think critically about how to apply AI as a force multiplier to…
Read MoreJune 27, 2024
Expert Advice on Ransomware Defense for Small Businesses
Posted by: Sally Vincent
There’s no way around it; ransomware is one of the most formidable threats to small businesses. Ransomware is a type of malicious software designed to block access to a computer system or data until a sum of money is paid.…
Read MoreJune 21, 2024
What Are Living Off the Land Attacks?
Posted by: Andrew Hollister
In the physical world, “living off the land” simply means to survive only by the resources that you can harvest from the natural land. There may be multiple reasons for doing this — perhaps you want to get “off the…
Read MoreMay 20, 2024
Three Ways Organizations Can Overcome the Cybersecurity Skills Gap
Posted by: Andrew Hollister
Organizations face a significant obstacle: the cybersecurity skills gap. In fact, according to a recent Cybersecurity Ventures report, there are 3.5 million cybersecurity jobs available worldwide. The talent shortage has become a critical impediment for organizations as they lack the necessary…
Read MoreApril 22, 2024
How Government Agencies Can Defend Against Exfiltration Tactics
Posted by: Leonardo Hutabarat
In the wake of recent cyber attacks targeting governmental agencies, the need for robust cybersecurity measures has never been more pressing. Most recently, the hacking group R00tK1T has been in the spotlight for its sophisticated campaigns against the cybersecurity infrastructure…
Read MoreFebruary 26, 2024
Why SaaS SIEM? A Comprehensive Guide for Businesses
Today’s businesses are increasingly reliant on technology, meaning the importance of airtight cybersecurity cannot be overstated. As organizations navigate the complexities of the modern digital ecosystem, maintaining the integrity of their systems has become more than just a “nice to…
Read MoreFebruary 9, 2024
2024 Cybersecurity Predictions
Posted by: Kelsey Gast
Entering a new year, the cybersecurity landscape is poised for significant shifts, driven by the dynamic interplay between technological advancements and persistent threats. In this blog, industry experts share their insights and predictions, offering a nuanced perspective on the cybersecurity…
Read MoreJanuary 9, 2024
Top Cybersecurity Threats to Look For
Posted by: Sally Vincent
It’s critical to stay ahead of top cybersecurity threats, but this can be challenging for security leaders, since both sides of the playing field change continuously. The external threat landscape is always evolving, as attackers develop and refine new tools…
Read MoreJune 22, 2023
Is Your Cybersecurity Vendor Built to Thrive or Struggling to Survive?
Posted by: Christopher O’Malley
The last several years were an incredible run for the cybersecurity industry. Even as the pandemic put pressure on many areas of the global economy, technology companies — and cybersecurity vendors in particular — thrived. Venture capital was plentiful, company…
Read MoreMay 30, 2023
Lookout for W2 Phishing Attacks During Tax Season
Posted by: Kevin D. Kirkwood
Tax season is a particularly busy time of year for folks from the payroll department and the finance team. They are preparing to deliver statements that must be correct for their employees to be able to pay their taxes. They…
Read MoreFebruary 23, 2023
Stop Asking if Your Organization is Secure — It’s Not
Posted by: Andrew Hollister
“Is my organization secure?” If you are asking that question, you are asking the wrong question. There is an important, underlying truth that the entire industry needs to acknowledge and be more transparent about; there is no such thing as…
Read MoreJanuary 18, 2023
2023 Cybersecurity Predictions
Posted by: Kelsey Gast
With the start of a new year, LogRhythm is announcing our 2023 cybersecurity predictions! This is a tradition at LogRhythm, as each year our executives reveal cyberthreats organizations across the globe may potentially face. Looking back at our 2022 and…
Read MoreJanuary 10, 2023
Benefits of DevSecOps for the Business
Posted by: Kevin D. Kirkwood
Every day there is a new discovery that hackers use to disrupt a company’s systems, obtain critical data and information, or steal money. Ironically, it’s often a tiny bit of code that helps the organization execute a minor piece of…
Read MoreDecember 14, 2022