Threat Research

The SOC Analyst Experience: Tools and Techniques to Enhance Performance

Security operations center (SOC) analysts are on the frontline of defending against adversaries who are constantly trying to hack sensitive data and information that could lead to a damaging breach. The success of your security team is critical to properly…

Read More

Reducing Ransomware Risk in Healthcare

Editor’s Note: This a partnered sponsored guest blog written by Avertium. How much are you willing to pay to get your personal data back? How about hundreds and thousands of personal data records stored in your company? The impacts of…

Read More
Jonathan Zulberg

Staying Ahead of Evolving Cyber Threats

Staying Ahead of Evolving Cyber Threats “Organizations that combine comprehensive visibility, continuous monitoring, advanced analytics, and efficient incident response orchestration are well-positioned to identify and respond to the early indicators of an intruder and rapidly neutralize the threat,” Jonathan Zulberg,…

Read More
Scalable Automated Network Threat Detection in Action

Scalable, Automated Network Threat Detection in Action

Read More
The Fast Mode logo

Cybersecurity in the IoT World

Cybersecurity in the IoT World: How Telcos Can Secure Critical Infrastructure Against New Threats Over the last year, threat actors have launched a series of major attacks on critical infrastructure, an industry fast becoming one of the most targeted by…

Read More
Log4Shell Vulnerability

Impact and Insights on Log4Shell Vulnerability

Read More
Mohan Raj

Attacks on IoT: The Call to Combat Rising Cyberthreats in the Telco Space

Attacks on IoT: In today’s cyberthreat landscape, threat actors are drawn to organizations that operate within critical infrastructure sectors, including telecommunications (telco), due to the potential to cause significant damage and disturbance to critical processes that benefit ordinary people and…

Read More
Security Middle East and Africa

Cloud Security Needs to Become a Higher Priority

Mazen Dohaji, Vice President, iMETA, LogRhythm in conversation with Security Middle East and Africa talks about the evolving cybersecurity landscape and explained that with the cloud adoption gaining momentum, cloud security needs to be priority for the organizations in the region.

Read More
Data Security, Digital Transformation & The Great Resignation

Data Security, Digital Transformation & The Great Resignation

Read More
Log4Shell Vulnerability

Impact and Insights on Log4Shell Vulnerability

 The recently-disclosed “Log4Shell” vulnerabilities in Apache Log4j 2 had a major impact in the cybersecurity world due to the severity of the exploit and the incredibly widespread use of Log4j 2 in modern software. In this webinar the LogRhythm…

Read More
Future-proof your SOC with predictive threat intelligence & NextGen SIEM

Future-proof your SOC with predictive threat intelligence & NextGen SIEM

Read More

Log4J: How it works and how to remediate the vulnerability in your environment

Read More

CISOs on the front line: What’s ahead for cybersecurity in 2022

Cybersecurity is ever-evolving. For CISOs to continue tackling the threat landscape successfully, they must implement more sophisticated defense strategies in 2022 to mirror the increasing sophistication of the methods used by hackers. Kev Eley, Vice President Sales, Europe at LogRhythm,…

Read More
Image of Kev Eley to the left and the helpnet and LogRhythm logo's to the right, cybersecurity threats and challenges in 2022

2022: threats and future cybersecurity challenges

How do you ensure your business thrives, not just survives in cybersecurity, with its various evolving threats and challenges? To help get you started, Kev Eley, VP of Sales, Europe, has taken a deep dive into the potential 2022 threat…

Read More

Ransomware-as-a-Service Breakdown: Auditing Conti and REvil TTPs Using the MITRE ATT&CK Framework

Read More
Clouds

An Overview of Cloud-Native Security Approaches

Responsibility for cloud security is shared between the cloud service provider’s (CSP) security department and the corporate information security team. In order to ensure compliance, visibility, and control across the entire stack of applications, the cloud service providers and various…

Read More

Don’t Gamble with Golden SAML

Read More

Moving Laterally to the Microsoft 365 Cloud Using a Simulated Domain Trust Modification Attack

Read More