The SOC Analyst Experience: Tools and Techniques to Enhance Performance
Security operations center (SOC) analysts are on the frontline of defending against adversaries who are constantly trying to hack sensitive data and information that could lead to a damaging breach. The success of your security team is critical to properly…
Read More
May 25, 2023
Reducing Ransomware Risk in Healthcare
Editor’s Note: This a partnered sponsored guest blog written by Avertium. How much are you willing to pay to get your personal data back? How about hundreds and thousands of personal data records stored in your company? The impacts of…
Read More
December 28, 2022
Staying Ahead of Evolving Cyber Threats
Staying Ahead of Evolving Cyber Threats “Organizations that combine comprehensive visibility, continuous monitoring, advanced analytics, and efficient incident response orchestration are well-positioned to identify and respond to the early indicators of an intruder and rapidly neutralize the threat,” Jonathan Zulberg,…
Read More
May 26, 2022
Scalable, Automated Network Threat Detection in Action
Read More
May 13, 2022
Cybersecurity in the IoT World
Cybersecurity in the IoT World: How Telcos Can Secure Critical Infrastructure Against New Threats Over the last year, threat actors have launched a series of major attacks on critical infrastructure, an industry fast becoming one of the most targeted by…
Read More
May 9, 2022
Impact and Insights on Log4Shell Vulnerability
Read More
April 28, 2022
Attacks on IoT: The Call to Combat Rising Cyberthreats in the Telco Space
Attacks on IoT: In today’s cyberthreat landscape, threat actors are drawn to organizations that operate within critical infrastructure sectors, including telecommunications (telco), due to the potential to cause significant damage and disturbance to critical processes that benefit ordinary people and…
Read More
April 28, 2022
Cloud Security Needs to Become a Higher Priority
Mazen Dohaji, Vice President, iMETA, LogRhythm in conversation with Security Middle East and Africa talks about the evolving cybersecurity landscape and explained that with the cloud adoption gaining momentum, cloud security needs to be priority for the organizations in the region.
Read More
April 28, 2022
Data Security, Digital Transformation & The Great Resignation
Read More
March 10, 2022
Impact and Insights on Log4Shell Vulnerability
The recently-disclosed “Log4Shell” vulnerabilities in Apache Log4j 2 had a major impact in the cybersecurity world due to the severity of the exploit and the incredibly widespread use of Log4j 2 in modern software. In this webinar the LogRhythm…
Read More
February 24, 2022
Future-proof your SOC with predictive threat intelligence & NextGen SIEM
Read More
January 19, 2022
Log4J: How it works and how to remediate the vulnerability in your environment
Read More
December 17, 2021
CISOs on the front line: What’s ahead for cybersecurity in 2022
Cybersecurity is ever-evolving. For CISOs to continue tackling the threat landscape successfully, they must implement more sophisticated defense strategies in 2022 to mirror the increasing sophistication of the methods used by hackers. Kev Eley, Vice President Sales, Europe at LogRhythm,…
Read More
December 15, 2021
2022: threats and future cybersecurity challenges
How do you ensure your business thrives, not just survives in cybersecurity, with its various evolving threats and challenges? To help get you started, Kev Eley, VP of Sales, Europe, has taken a deep dive into the potential 2022 threat…
Read More
December 6, 2021
Ransomware-as-a-Service Breakdown: Auditing Conti and REvil TTPs Using the MITRE ATT&CK Framework
Read More
November 3, 2021
An Overview of Cloud-Native Security Approaches
Posted by: David Balaban
Responsibility for cloud security is shared between the cloud service provider’s (CSP) security department and the corporate information security team. In order to ensure compliance, visibility, and control across the entire stack of applications, the cloud service providers and various…
Read More
October 15, 2021
Don’t Gamble with Golden SAML
Read More
June 30, 2021
Moving Laterally to the Microsoft 365 Cloud Using a Simulated Domain Trust Modification Attack
Read More
May 19, 2021