Multimedia Showcase

Identify Emerging Threats on Your Network in Real Time

Silicon logo

French Hospital Offline After Ransomware Attack

November 22, 2019

A hospital in France has been hit by a ransomware attack that knocked its computer systems offline, forcing staff to resort to good old fashioned pen and paper…

Built in Colorado logo

The Software Development Practices These Engineering Leaders Swear By

November 15, 2019

When you consider general technological advancement of the last century, pieces of code themselves don’t normally come to mind. But specific engineering output has…

University of Colorado Denver logo

14th Annual Business Leader with an Edge Event Brings Cybersecurity Experts to CU Denver

November 11, 2019

Cyber threats can affect anyone. At the Business Leader with an Edge event, seasoned experts in cybersecurity spoke candidly with students about the threats we’re facing…

siliconangle logo

Connectwise Warns Customers of Ongoing Ransomware Campaign

November 10, 2019

Remote IT management solutions firm ConnectWise LLC is warning customers that hackers are targeting its software to install ransomware…

Denver Business Journal logo

CTA APEX Awards: LogRhythm CISO Looks to Tech's Future as He Makes IT More Secure

November 7, 2019

You’d expect an information security officer to secure information for his employer — but what you might not expect is for him to secure the industry’s future. Meet James Carder, the guy who’s…

Threatpost logo

Why Big Breach Fines Don’t Equal Fewer Breaches

November 7, 2019

Despite trillions of dollars in breach fine payouts, each year the number of compromised companies and individuals with private data exposed rise…

SC Media logo

Overstretched SOCs, the Cyber-Security Skills Gap and the Cloud

November 1, 2019

Historically, cyber-security has been a cat and mouse game. As cyber-criminals concocted ever more sophisticated means of accessing networks, the security professionals hired to thwart…

govcybesecurityrhub logo

Practice Makes Perfect – Honing Incident Response Skills

October 31, 2019

Practice makes perfect. It’s a cliché for a reason, because it’s very true. The more you work at a particular skill or task, the better and more proficient that you become at it…

Security Brief AU logo

Routing the Enemy Within – Logrhythm

October 29, 2019

Do you expect high tech attacks to be swift and dramatic – the sort that makes the news and brings companies to their metaphorical knees? Data breaches and cyber-attacks have become…

Digital Journal logo

UniCredit Involved in Major Databreach

October 29, 2019

Italian bank UniCredit has uncovered 2015 data breach involving the personal records of 3 million clients. Delving into the issue is James Carder, CISO and VP of LogRhythm Labs…

Dark Reading logo

Planning a Zero-Trust Initiative? Here's How to Prioritize

October 23, 2019

My team and I have been on a journey toward implementing an identity-centric zero-trust approach over the last three years, leveraging existing technologies…

Forbes logo

15 Signs It's Time to Shut down Your Current Tech Project

October 17, 2019

You and your team have started a technology project, and it’s been in development for a long time—but for whatever reason, it just isn’t gaining traction. As difficult as it can be, it may be time to pull the plug…

One Million by One Million Blog logo

Thought Leaders in Cyber Security: LogRhythm CTO and Chief Product Officer Chris Petersen (Part 2)

October 8, 2019

In part two of this interview, Sramana Mitra discusses with Chris Petersen examples of how automation can solve cybersecurity challenges, as well as his thoughts on future threats within the industries’ future landscape…

One Million by One Million Blog logo

Thought Leaders in Cyber Security: LogRhythm CTO and Chief Product Officer Chris Petersen (Part 1)

October 7, 2019

In part one of this interview, Sramana Mitra talks to CTO and Co-Founder of LogRhythm, Chris Petersen, about the company’s solutions, ecosystem, and trends in the cybersecurity industry…

Solutions Review logo

LogRhythm Releases True Unlimited Data Plan for SIEM

October 4, 2019

Recently, SIEM solution provider LogRhythm announced the launch of the True Unlimited Data Plan for their NextGen SIEM. According to LogRhythm, this plan aims to allow enterprises to increase their cybersecurity data ingestion…

Forbes logo

10 Ways AI And Machine Learning Are Improving Endpoint Security

September 25, 2019

Gartner predicts $137.4B will be spent on Information Security and Risk Management in 2019, increasing to $175.5B in 2023, reaching a CAGR of 9.1%. Cloud Security, Data Security, and Infrastructure…

Data Protection Magazine logo

How SOAR, SIEM, and the Cloud Can Help Organisations Overcome the Cybersecurity Skills Gap

September 18, 2019

With threats coming from every angle, organisations, and the cybersecurity professionals they rely upon, are increasingly struggling to keep level with this ever-present security challenge; and this dynamic is being felt across the industry…

Dark Reading logo

Phishers' Latest Tricks for Reeling in New Victims

September 9, 2019

Phishing works because people are, by nature, trusting – but these evolving phishing techniques make it even tougher for security managers to stay on top…

Illusive Networks logo

Illusive Networks Joins LogRhythm Technology Alliance Partner Program

September 3, 2019

Illusive Networks®, the leader in deception-based cyber defense, today announced an out-of-the-box integration with the LogRhythm NextGen SIEM Platform. The solution provides real-time…

colorado security logo

Podcast Episode 131: Mark Logan, CEO at LogRhythm

September 2, 2019

Mark Logan, new CEO of LogRhythm is our feature interview this week. News from: Frontier Airlines, Amazon, Regis University, Coalfire, Optiv, LogRhythm, Zvelo, Ping Identity and a lot more…

CSO Online logo

Security Leader: Simon Howe, LogRhythm

August 31, 2019

CSO Australia recently interviewed Simon Howe, APAC Sales Director for LogRhythm, about his career, challenges in the cybersecurity space, and recommendations for security teams and companies…

Built in Colorado logo

Meet 4 Colorado Tech Companies Looking for Dynamic Developers

August 14, 2019

Engineers are a unique breed. Engineering teams are — as the name suggests — the engine room of any digitally driven business, and they often nurture a wholly different mindset…

Biz West logo

Logrhythm’s Logan: Company to Go “Extremely Aggressive” to Win Market Share

August 7, 2019

Newly minted LogRhythm Inc. CEO Mark Logan has been on the job for just a few weeks, but he believes the Boulder-based cybersecurity company can beat out computing giants in the race to protect company data…

Forbes logo

Get Your Voice Heard: 12 Tips For Politically Minded Tech Industry Leaders

August 2, 2019

The tech industry has been in the news lately for all sorts of issues, from net neutrality to protecting consumer data and more. With legislation increasingly finding a way into the tech industry…

Forbes logo

Big Data, Big Changes: 15 Industries And Functions Big Data Can Revolutionize

July 25, 2019

We live in a world ruled by data. One study predicts that by 2020, 1.7 MB of data will be created every second for every person on earth. In other words, it’s officially the age of Big Data…

Forbes logo

14 Ways To Protect Your Company's Intellectual Property (Besides NDAs)

July 25, 2019

When it comes to your company’s intellectual property (IP), you can never play it too safe. Enforcing nondisclosure agreements (NDAs) is a good first step toward protecting your business, but these documents may not cover everything…

CSO Online logo

Getting the Board on Board with Cyber-Security: Top Tips for Making a Compelling Case for Resources to Safeguard the Enterprise

July 19, 2019

Work for an organisation that’s become concerned about cyber-security? You’re far from alone. Thanks to a rash of high-profile attacks and incursions, Australian business leaders are woke…

Dark Reading logo

Back to Basics with Log Management, SIEMs & MSSPs

July 12, 2019

For security professionals and forensics investigators, it doesn’t get any more basic than the unrelenting flow of log data generated by countless machines attached to the enterprise backbone…

Forbes logo

Financial Firms Reported Staggering 819 Cyber Incidents in 2018 – 12 Times More Than 2017

July 1, 2019

Financial services firms based in the UK reported a staggering 819 cyber incidents to the UK regulator Financial Conduct Authority in 2018, a massive increase on the 69 incidents reported in 2017…

Built in Colorado logo

3 Colorado Techies Share How Their Favorite Perks Help Them Do Their Best Work

June 26, 2019

Today, company perks run the gamut from nice-to-haves — like cold brew on tap, on-site gyms or company-sponsored outings — to must-haves — like healthcare, paid time off and a 401(k) — with a whole lot in between…

Forbes logo

Does The Tech Industry Need More Regulation? 12 Tech Experts Weigh In

June 24, 2019

Regulation of the tech industry is a hot topic right now. Some industry leaders, such as Microsoft’s president, Brad Smith, and Apple CEO Tim Cook have come out in favor of more regulation…

Infosecurity Magazine logo

MITRE ATT&CK Framework Effective in Defending CNI

June 10, 2019

Speaking at Infosecurity Europe 2019 Andrew Habibi-Parker, director – professional services, EMEA & APJ at LogRhythm, explored security risks surrounding critical national infrastructure (CNI)…

CSO Online logo

Review: LogRhythm takes SIEM to the next level

June 10, 2019

When they were first created, Security Information and Event Manager (SIEM) platforms solved a big problem in cybersecurity: Too many alerts were being generated…

Forbes logo

12 Common Software Development Obstacles And How To Tackle Them

June 5, 2019

Developing and launching new software can be complicated. Within each step of the development and approval process, there are a lot of variables. While things can go right, there’s even more that can go wrong…

Forbes logo

Four Steps To Achieve Security Operations Maturity And Stop Cyberthreats

June 4, 2019

The numbers bear this out. A 2018 CyberEdge survey of 1,200 global IT security professionals found that a stunning 77% of surveyed organizations had suffered a breach over the past year. Even more worrisome is…

colorado security logo

Podcast Episode 120: Competing with Red Rocks CC and LogRhythm

June 3, 2019

James Carder, LogRhythm’s CISO, Joe Murdock Cyber Security Program Lead at Red Rocks Community College, and Matt Adrian, a current Red Rocks student, discuss…

virtualizationhowto logo

Install LogRhythm NetMon in VMware vSphere VM

June 3, 2019

In the previous post, Free Network Threat Detection Monitoring and Forensics Tool, we tool a look at a great free network threat detection, monitoring solution, and forensics tool…

Singapore Business Review

Singapore's most innovative companies recognised at the Singapore Business Review Technology Excellence Awards 2019

May 31, 2019

Singapore Business Review awarded the most outstanding companies at the inaugural SBR Technology Excellence Awards held at Conrad Centennial Singapore last 30 May…

virtualizationhowto logo

Free Network Threat Detection Monitoring and Forensics Tool

May 31, 2019

Today’s networks are becoming increasingly complex and full of many different kinds of traffic traversing them. Capable tools are needed to be able to detect threats in real time and perform network monitoring and forensics…

Channelnomics logo

LogRhythm Takes Its SIEM to the Cloud

May 15, 2019

LogRhythm this week introduced a cloud-based version of its NextGen Security Information and Event Management platform, which promises full security monitoring, management, and automation functionality with fewer infrastructure headaches…

Human Resources Director (HRD) logo

How effective employee training can reinforce the cybersecurity cordon

May 15, 2019

Are your employees all over the data protection detail or slapdash in the way they handle customer data - and about cyber-security in general? If you answered yes, then you’re failing to make use of…

Telecom Times logo

LogRhythm Names QLD’s Baidam Solutions as New Australian Reseller

April 29, 2019

US security intelligence firm LogRhythm has appointed Queensland-headquartered Baidam Solutions as its latest information security and technical solutions reseller consulting partner in Australia…

Security Brief AU logo

AI Helping Businesses Stay Ahead of Threats - LogRhythm

April 15, 2019

As the frequency and severity of cyber-attacks and data breaches continue to increase, cybersecurity vendors and their customers need to ensure they’re keeping ahead of cyber trends…

IT Wire logo

Budget Generally Gets a Tick From IT Industry

April 3, 2019

A mix of large, medium-sized and small IT businesses have generally welcomed the measures in the Federal Budget that affect their industry, though the government’s meddling in…

CSO Online logo

12 Tips for Effectively Presenting Cybersecurity to the Board

March 19, 2019

Cybersecurity is a top concern for boards of directors. In fact, 42% of the nearly 500 leaders surveyed by the National Association of Corporate Directors listed cybersecurity risks as one of the five most pressing concerns they’re facing…

ZDNet logo

Cybersecurity: Why Bosses are Confident, and Tech Workers are Scared

March 11, 2019

Panic stations or nothing to worry about? When asking how well prepared businesses are to tackle the threat from hackers the answer you get will vary wildly depending on who you talk to inside a firm…

IT Brief Australia logo

Where to From Here? Women in Cybersecurity Speak Up

March 8, 2019

For this year’s International Women’s Day, the theme is #BalanceforBetter - focusing on encouraging a more gender-balanced world. Lack of representation, the glass ceiling, a gender pay gap and toxic attitudes in the workplace…

SC Media logo

The winners of the 2019 SC Awards Honored in the U.S.

March 6, 2019

There’s only one “you,” but at least there’s plenty of ways to prove you’re you. That’s especially true when using RSA SecurID Access, a smart authentication platform that offers a host of…

ITPro Today logo

LogRhythm Tackles Network-Borne Threats Via Automation

March 6, 2019

LogRhythm, a company focused on security intelligence, has introduced a new product that automates the process of responding to advanced network-borne threats. By combining and automating data collection…

The Educator Online Australia logo

Opinion: Securing the Learning Experience

February 26, 2019

Education is the bedrock of modern society. The life we live today in the developed world would not be possible without quantum advances in science, medicine and technology; many of them emanating from the rich…

Lawyer Monthly logo

The GDPR Jungle: How Are We Coping Nine Months On?

February 26, 2019

Companies including Marriott, British Airways and Dixons Carphone are some of the high-profile names that have revealed data breaches impacting hundreds of millions of people, although it’s not yet certain whether…

CSO Online logo

Sidestepping the Sucker Punch: Why Organisations Need to be on the Alert for Targeted Ransomware Attacks in 2019

February 26, 2019

It’s an intimidating prospect – being up against an opponent who knows how to hit you right where it’s going to hurt the most. Add in the element of surprise and you’re looking at a real sucker punch, one that can…

CBR logo

The Benefits of a SOAR Approach to Network Security

February 20, 2019

As the sheer variety of hacks and breaches over the past 12 months has shown, any organisation can fall victim to a cyber-attack that compromises their network, writes Ross Brewer, VP & MD EMEA, LogRhythm…

Finance Digest logo

How Financial Firms Can Use Technology To Combat Today’s Cybercriminals

February 19, 2019

Technology has advanced to the point that today’s financial services organisations, such as brokers, fund managers, insurers and banks, are constantly connected. However, there is a dark side to this connectedness…

Security Boulevard logo

2019’s Hottest, and Most Bankable, Security Certs

February 12, 2019

Most certifications can help your career, but a select few will land you a great job or add money to your paycheck. Here are the most bankable certifications this year, as well as a glimpse of next year’s…

Security Brief AU logo

APJ Experts Comment on Aus Parliament Breach

February 11, 2019

Late last week, Australian security agencies reported they were looking into a security breach of the Federal Parliament’s network. The Federal Parliament has said in a statement that authorities have yet to…

Techradar Pro logo

Facebook Reaching 15 – a Stark Reminder of the Value of Data

February 8, 2019

As you’ll likely have seen, Facebook recently hit the ripe old age of 15. It’s hard to believe that it’s really been around for that long. Whilst Facebook was not strictly the first social media platform …

CBR logo

Over 59,000 GDPR Infractions Reported in the Last Eight Months

February 7, 2019

Since the European Union’s GDPR legislation came into force in May 2018, over 59,000 data breaches have been reported to European data protection authorities. This is the findings of a new report from global law…

Technology Decisions logo

NDB Stats Highlight Need for Security Rethink: Experts

February 7, 2019

The findings of the fourth Notifiable Data Breach Quarterly Statistics Report show that Australian organisations have much work to do to improve their security posture, according to experts…

Dynamic Business logo

Help! My Bank Account's Been Cleaned Out By Another ‘Me’

February 4, 2019

Stolen identity is an equally dramatic real life issue that can be costly to fix and which rarely results in a happy ending. It’s a problem which has affected hundreds of Australians whose only ‘crime’ is likely…

IT Brief Australia logo

LogRhythm: Foster a Culture of Cybersecurity Awareness

February 1, 2019

Cybersecurity is no longer a ‘nice to have’; it’s essential. In a world where threats are becoming ever more common, organisations across all industries must be proactive about preserving the integrity of their systems and data…

Retail Biz logo

How Retailers Can Stay Safe in Today’s Digital Landscape

January 30, 2019

It’s a case of ‘digitise or die’ for Australian retailers but doing so can see sensitive customer and corporate information exposed to new risks. According to the NAB Online Retail Sales Index, Australians spent an impressive…

Forbes logo

12 Technologies Experts Say Will Populate The Homes Of Tomorrow

January 28, 2019

Years ago, the concept of “smart homes” and advanced artificial intelligence could only be found in futuristic sci-fi movies. Today, these technologies are increasingly becoming…

Technology Reseller Magazine UK logo

Wellington Goes into Cyberbattle with LogRhythm

January 27, 2019

Independent boarding school Wellington College has chosen LogRhythm’s NextGen SIEM Platform to boost its cyber security. The platform combines user and entity behaviour analytics (UEBA), network traffic and…

IT Pro Portal logo

2018 Hacks Indicate Importance of Threat Detection

January 24, 2019

Companies continue to fail to detect anomalous network activity, but it’s not often this kind of activity has been going on for so long without being flagged. At the end of November, an official statement revealed that the…

CSO Online logo

Why Cyber-Security Should be Top Priority for Banks That Want to Rehabilitate Their Reputations

January 23, 2019

Are cyber-attacks an inevitability in the financial services industry, given the wealth of personal data – and funds – entrusted to the keeping of banks, insurers and other players in the sector?…

Channel Life logo

Interview: Chillisoft and LogRhythm ready for the NZ Channel

January 23, 2019

Chillisoft is wasting no time in taking its operations to a new level, partnering with LogRhythm as yet another vendor to complement its solution portfolio…

Forbes logo

13 Of The Best Virtual Reality Uses In Industry To Date

January 23, 2019

Virtual reality (VR) is emerging from being a niche gaming novelty. Its potential practical uses are making many industries sit up and take notice. With near-endless configuring possibilities…

KHMER TIMES logo

Vietnet to distribute LogRhythm products in Cambodia

January 18, 2019

Vietnet Distribution JSC is now an official distributor in Cambodia for global cybersecurity firm LogRhythm. The partnership comes at a momentous time, with the country developing its digital infrastructure and the government…

Corporate Compliance Insights logo

3 Key Compliance Trends for 2019

January 18, 2019

Recent events like the enactment of the GDPR and high-profile data breaches have driven compliance into the spotlight – a boon for the GRC field. And, already, 2019 is already shaping up to be an exciting year in the…

CSO Online logo

13 Data Breach Predictions for 2019

December 18, 2018

Data breaches are inevitable at any organization. But what form will those breaches take? How will the attackers gain access? What will they steal or damage? What motivates them to attempt the attacks? CSO has gathered predictions…

IT Business Edge logo

New Focus on Data Privacy Directs Compliance Trends in 2018

December 17, 2018

Data privacy took center stage in 2018. Compliance regulations surrounding protecting confidential data aren’t new – laws like HIPAA have been around for years – but GDPR got everybody’s attention. Data privacy compliance has taken a…

Built in Colorado logo

100 Best Places to Work in Colorado 2019

December 12, 2018

Built In Colorado’s Best Places to Work list highlights the area’s technology and startup companies with the best benefits and salaries…

Dark Reading logo

7 Common Breach Disclosure Mistakes

December 6, 2018

The flip side to sharing too much information is sharing too little. The point of notifying customers is to allow them to protect themselves, so share what you can in order to help…

Forbes logo

15 Traits Tech Leaders Are Looking For In New Team Members

December 5, 2018

In today’s rapidly evolving technology industry, there’s greater demand than ever for specialized skills and industry experience. But not every company is looking for the same abilities…

Ect New Network logo

Quora Looks for Answers in Wake of Massive Data Breach

December 5, 2018

The personal data of some 100 million people who have used Quora, a popular question and answer website, has been compromised, the company disclosed Monday…

IT World Canada logo

Breaking News: Hotel Hack of 500 Million Customers Over Four Years

November 30, 2018

Mariott Hotels this morning admitted encrypted and unencrypted personal information on 500 million customers who made reservations at one of its Starwood Hotels has been copied over four years from one of its databases…

CSO Online logo

A SWIFT Response to Threats: How the Global Financial Network Safeguards Itself Against Compromise and Theft

November 26, 2018

In the digital era, cyber-security is – or should be – a prime concern for Australian organisations of all stripes and sizes. The Australian Cyber Security Centre’s 2017 Threat Report notes the existence of thousands of adversaries…

Forbes logo

Overcoming A Cybersecurity Breach: 12 Tips For Young Tech Professionals

November 20, 2018

With regular news stories of companies falling victim to security breaches, it can be a scary time for new tech executives. As hackers get better at attacking company networks, tech teams need to look deeper into…

Forbes logo

Smart Strategies For Leveraging Gamification Within Your Business

November 15, 2018

Gamification has become a go-to tactic for engaging consumers and employees alike in recent years. By applying elements of typical gaming activities such as continuation streaks, point systems and rewards…

Security Brief Asia logo

Exclusive: Fileless malware driving uptake of behavioural analytics

November 12, 2018

Over the past year, a new form of malware has emerged that is able to more successfully evade traditional detection and defence techniques. As a result, it is seeing increased use by…

Denver Business Journal logo

CTA APEX Awards: James Carder is a CISO of the Year Finalist

November 8, 2018

As CISO of Boulder-based LogRhythm, James Carder designed and created a five-year road map for the company’s cybersecurity program. One milestone on that path was aligning with a “Zero Trust” model that requires…

eWeek logo

LogRhythm Advances NextGen SIEM Security Platform With SOAR Features

October 30, 2018

LogRhythm is adding case playbooks and enhanced response and security operations center metrics to its NextGen SIEM platform. Some organizations might think of Security Information and Event Management (SIEM) technology as…

Forbes logo

Three Steps to Solving Content Management Confusion

October 26, 2018

Today’s content management platforms make it easier for people to securely share ideas, collaborate and get work done better and faster. That’s the plan. But it doesn’t always succeed…

Dark Reading logo

12 Free, Ready-to-Use Security Tools

October 12, 2018

There’s no excuse for not knowing your exposure. These free tools can help you analyze what your company is up against and point ways to developing a more thorough security program…

Gov Tech Review logo

Industry Welcomes NSW Cyber Security Strategy

October 8, 2018

Representatives of the IT security sector have welcomed the newly announced NSW Government Cyber Security Strategy, and urged other states to follow NSW’s example with their own integrated strategies…

Techaeris logo

Some Experts Agree that Facebook Security is in Need of Some Serious Work

September 29, 2018

Facebook security wasn’t something most of us worried about just five years ago. Most users happily went about their Facebook lives and never thought twice about…

Singapore Business Review

MAS Intensifies Bout Against Cyberthreats for FIs

September 26, 2018

MAS proposed to make a slew of cybersecurity measures for financial institutions (FIs) into legally binding requirements…

Channel NewsAsia logo

Online NRIC Generators a 'cause for concern', Cybersecurity Experts Say

September 9, 2018

SINGAPORE: While the Government has issued new guidelines against indiscriminate collection of NRIC details, cybersecurity experts have highlighted a different kind of personal data threat…

CSO Online logo

Cryptojacking Instances in Australia are on the Rise

September 4, 2018

One weekend in February, prominent government websites from around the world began triggering alerts in users’ anti-virus. State government…

Data Breach Today Asia logo

Catching Attacks Early in the Kill Chain

August 23, 2018

Organizations need to detect security events early in the kill chain in order to deflect attackers, says Matthew Winter of LogRhythm…

Security Brief Asia logo

Exclusive: How AI and Quantum Computing are Changing Cybersecurity

August 21, 2018

The advancement of artificial intelligence (AI) and quantum computing technology have brought equal parts excitement and trepidation to the…

Lawyer Monthly logo

Your Thoughts: Dixons, Reddit and The Breach Boom

August 6, 2018

Week after week media outlets spout out news about large companies failing to disclose old breaches, suffering current security breaches or refusing to…

Enterprise Innovation logo

Singapore to Increase Cybersecurity Measures

August 3, 2018

Following the most serious breach of personal data in Singapore’s history, the Smart Nation and Digital Government Group (SNDGG), together with the Cyber Security Agency of Singapore (CSA), has completed a…

Information Age logo

Reddit Suffers a Major Breach

August 3, 2018

Social media site Reddit has admitted to suffering a data breach stemming from a hack last June but has refused to disclose its scale…

Kr ASIA logo

Understanding Digital Clues Key in Cyber Breaches: LogRhythm Exec

July 29, 2018

The advancement of artificial intelligence (AI) and quantum computing technology have brought equal parts excitement and trepidation to the…

Today logo

SingHealth Cyberattack Likely to be State-Sponsored; Medical Data a Goldmine for Hackers, Say Experts

July 20, 2018

The cyberattack on SingHealth is likely to have been state-sponsored, given the type of data that was taken and the amount of resources required to mount such a breach, cybersecurity experts said…..

SC Media logo

Singapore Responds Quickly to its Biggest Ever Cyber-attack

July 20, 2018

Singapore’s government health database has been hacked and the personal information of about 1.5 million people has been stolen, including that of Prime Minister Lee Hsien Loong….

Channel Asia Singapore logo

LogRhythm Strikes Distribution Deal with M.Tech Across Key Asian Markets

July 19, 2018

LogRhythm has signed an agreement with Singapore-based M.Tech for the distribution of its cyber security solutions across Asia Pacific…

Infosecurity Magazine logo

Ticketmaster Breach Part of Global Digital Skimming Campaign

July 16, 2018

The Ticketmaster UK ‘breach’ is far more extensive than at first thought — part of a single operation by a threat group affecting over 800 e-commerce sites around the globe, according to new intelligence….

Silicon logo

Timehop Admits Data Theft of 21 Million Users

July 9, 2018

Timehop has admitted it is at the centre of a large data breach after it reported that the data from 21 million users had been stolen on 4 July….

SC Media logo

Ticketmaster UK Customers Hit in Third-Party Breach

June 28, 2018

Ticketmaster UK is alerting its customers to a third-party security incident that may have compromised their information…

SC Media logo

Tesla Saboteur Trains Spotlight on Insider Threats

June 21, 2018

Tesla’s recent revelation that an employee turned saboteur messed with code and exfiltrated data underscores the continuing challenge and complexity of insider threats and the difficulty ferreting them out before they can do harm…

Security Week logo

5.9 Million Card Details Accessed in Dixons Carphone Hack

June 21, 2018

Dixons Carphone, a household name in the UK, announced (PDF) today that it is investigating “unauthorised access to certain data held by the company.”…

CSO Online logo

GDPR Compliance in a Nutshell

April 25, 2018

If your organization is like most, you may be freaking out about the upcoming General Data Protection Regulation (GDPR) enforcement date of May 25, 2018…

Security Brief Asia logo

Diving Into the Malware Abyss with LogRhythm's Erika Noerenberg

April 23, 2018

Reverse engineering malware is a job that’s never the same from one day to the next – much like the evolution of malware itself. Even when it’s malware from a variant that already exists…

The Wall Street Journal logo

Survey Roundup: Regulatory Inconsistencies Take Toll on Companies

April 19, 2018

A survey of 751 IT decision-makers in the U.S., U.K. and Asia-Pacific by security company LogRhythm found one-third said they spend 10% or less of their IT budget on security…

Infosecurity Magazine logo

Organizations Failing at Timely Detection of Threats

April 11, 2018

Detection and remediation capabilities still need work at most organizations. Less than half of all organizations in a benchmark survey from LogRhythm were able to detect…

Journal of Cyber Policy logo

IT Professionals Lack Confidence in Their Ability to Detect and Contain Cyberbreaches

April 10, 2018

LogRhythm has just released its annual benchmark survey, Cybersecurity: Perceptions & Practices, which measures cybersecurity perceptions and practices of organizations in the United States…

The New Paper logo

How much data does Facebook have on you?

April 9, 2018

The New Paper reporters downloaded archives of their personal data from the two companies and found, among other things…

Infosecurity Magazine logo

The Diversity Cybersecurity Needs

April 6, 2018

Read up on information security challenges in the cloud, GDPR’s dark side, securing CNI and millennials in the workforce…

Tech Wire Asia logo

3 cybersecurity threats to universities and how they could be addressed

April 5, 2018

Earlier this week, four major Singapore universities said they were victims of cyber attacks, highlighting the need for Southeast Asian tertiary institutions to ramp up preventative measures…

DNA logo

Cyberwarfare: Machine vs Machine

April 3, 2018

Consider Volvo’s self-driving cars, Apple’s Siri, OCBC’s illegal financing detection system, and the Maritime and Port Authority of Singapore’s Project SAFER – today we’ve been seeing more of artificial intelligence (AI) technology…

Security Brief Asia logo

Not quick enough

March 28, 2018

Organisations around the globe still face a tough fight against the cyber threat battle, with new research from LogRhythm showing that fewer than half of all organisations are able to detect a ‘major’ cybersecurity incident within one hour…

Tech Wire Asia logo

Are concerns about cybersecurity just talk?

March 27, 2018

Businesses understand the growing importance of protecting their company against cyber incidents such as network breaches, data thefts, and frauds. However, as hackers get more competent and find better tools to aid them in their malicious plans…

Software Magazine logo

Continuous Security

March 23, 2018

Today’s SIEM solutions offer threat detection and security incident response by analyzing SIM and SEM data in real time for internal and external threat management. By analyzing historical data from compliance reporting and incident investigation, SIEM solutions…

Networks Asia logo

The hype and reality surrounding AI and ML

March 13, 2018

Machine vs machine. That’s the future battleground in cybersecurity. It is a scary thought but the perception that hackers are just people sitting behind the computers is no longer true…

CSO Online logo

The challenge of nailing IT security in an OT World

February 26, 2018

The Internet of Things (IoT) might be a current hot topic in technology circles, yet linking electronic devices to improve efficiency and automate processes is not exactly a new concept…

Professional Security Magazine Online logo

Detect Threats

February 13, 2018

Ross Brewer, vice president and managing director EMEA, LogRhythm, covers how organisations can use User and Entity Behaviour Analytics (UEBA) to detect threats…

CSO Online logo

How to approach a Zero Trust security model for your enterprise

February 9, 2018

Implementing a Zero Trust model to protect your enterprise’s critical systems could be worth the trouble…

Security Brief Asia logo

LogRhythm dips toes into UEBA market to defend against user-based threats

February 5, 2018

LogRhythm is dipping its toes into the User and Behaviour Analytics (UEBA) market for organisations that aren’t able to replace their existing legacy solutions - and to protect against insider threats, account takeovers, as well as privilege abuse and misuse…

CSO Online logo

Nearly half of users still don’t know what ransomware is – but AI promises a workaround

February 5, 2018

With many users still clueless about the existence of ransomware and companies struggling to change their behaviour, artificial intelligence (AI) is rapidly gaining currency as a solution to user indifference and a driver for more proactive defences in the future…

Newsweek logo

Apple iPhone Chip Vulnerability is the 'Most Disturbing' Security Issue in Decades

January 5, 2018

Apple has admitted that every iPhone and Mac computer is affected by the Meltdown and Spectre chip vulnerabilities, which security researchers say…

minutehack logo

Microchip Meltdown as Experts Uncover Serious Flaws

January 5, 2018

A serious flaw reportedly present in all Intel’s CPUs made in the past 10 years is leaving devices vulnerable to hackers, security experts have warned…

Tech Wire Asia logo

2017: A watershed year for cybersecurity

December 27, 2017

Though we will come to characterize 2017 with many words and many concepts over the coming months, this year will probably be remembered as the year when warfare came to the cyber sphere in earnest…

Info Security Magazine logo

Security Pros Waste 40 Hours Per Month Thanks to Inefficient Systems

December 20, 2017

The majority of IT decision-makers think the average cybersecurity professional wastes as much as 10 hours a week due to inadequate software…

Computer Weekly logo

Cloud AI in the Enterprise: Making the Security Case

November 17, 2017

In this guest post, Ross Brewer, managing director and vice president for Europe, Middle East and Africa at cybersecurity software supplier LogRhythm, makes the enterprise case for using artificial intelligence (AI) in the fight against cybercrime…

Comms Business logo

LogRhythm Deploy AI to Defeat Cyber Attacks

October 10, 2017

LogRhythm today introduced CloudAI a technology designed to help LogRhythm customers across the globe avoid damaging cyber incidents such as high-profile data breaches. CloudAI is an advanced cloud-based security analytics offering…

Dark Reading logo

Ransomware Numbers Continue to Look Abysmal

September 28, 2017

Ransomware is one of the fastest-growing concerns among IT pros, according to several studies out this week…

Dark Reading logo

7 SIEM Situations That Can Sack Security Teams

September 27, 2017

SIEMs are considered an important tool for incident response, yet a large swath of users find seven major problems when working with SIEMs…

Built in Colorado logo

At LogRhythm, people ride inner tubes to work — and help clients fight cyberattacks

September 25, 2017

Boulder-based LogRhythm is on a roll. Since its 2003 founding, the company has melded multiple technologies into a user-friendly platform that detects and responds to cyber threats and attacks…

SC Media logo

The Dark Overlord cybergang threatens kids in its latest attack

September 21, 2017

A cyber gang calling itself The Dark Overlord Solution late last week sent an unusually threatening ransom note to the Columbia Falls school district forcing officials to shutter its schools to ensure the safety of the students…

USA Today logo

How did the Equifax breach happen? Here are some answers and some questions.

September 14, 2017

Nearly half of all Americans are affected by a cyber security breach at Equifax, one of the nation’s three major credit-reporting agencies. Here’s how to avoid being a victim…

CSO logo

Hope is not a security strategy – which is why AI is no longer optional

September 8, 2017

Good information-security personnel have become harder and harder to find – and that is making it harder to mount an effective defence against ballooning volumes of security alerts…

The Denver Post logo

Clearing up confusion on the Equifax data breach, no thanks to Equifax

September 8, 2017

What the hack happened is unclear, but best to live like your personal data was stolen…

Built In Colorado logo

Why this security vet tapped a physicist to get LogRhythm off the ground

August 24, 2017

During the dot-com boom of the 90s, Chris Petersen could see that increased demand for cybersecurity was on the horizon. So, too, was the need for security analysts to detect and respond to threats rapidly…

CIO UK logo

Threat Lifecycle Management: The key to combatting sophisticated threats

August 15, 2017

In response to the shortcomings of prevention-centric security strategies and the challenges of securing an increasingly complex and open IT environment, many organizations should be shifting their resources and focusing towards strategies centered on threat detection and response…

eSecurity Planet logo

The importance of effective incident response: The HBO breach expands

August 9, 2017

The hackers behind the recent breach at HBO have posted additional stolen data online, including Game of Thrones script summaries and several emails from an HBO executive’s inbox, according to the Hollywood Reporter…

CEO Today logo

How can AI help us fight cyber crime?

August 8, 2017

How better to fight cybercrime than with today’s top cyber technology, AI; fighting fire with fire. Ross Brewer, Vice President and Managing Director at LogRhythm explains the ins and outs of artificial intelligence…

SC Media logo

£17 million fines for CNI companies under proposed EU SNIS plans

August 8, 2017

Under an (NIS) directive being adopted by the UK, CNI providers will face fines of £17 million or up to four percent of annual turnover if they fail to protect critical infrastructure from loss of services due to cyber-attacks…

SC Media logo

HBO breach accomplished with hard work by hacker, poor security practices by victim

August 8, 2017

Cybersecurity executives are speculating the HBO hack by “Mr. Smith” was the result of the intruder putting in a tremendous amount of effort to infiltrate the entertainment giant…

SC Media logo

HBO hacked: Game of Thrones, Ballers, Room 104 content involved

August 1, 2017

Entertainment Weekly reported that hackers claimed to have taken 1.5TB of data from HBO…

The Straits Times logo

Moving into a job in cyber security at 63

July 24, 2017

Madam Ivy Lim, who landed her new job in March, has lost no time in becoming software firm LogRhythm’s best-performing telesales employee in the region…

Business Reporter logo

A new approach to cyber security is required

July 17, 2017

Victims of damaging cyber breaches make the news every week – don’t become one of them…

CSO logo

Protecting critical infrastructure in an IoT world

July 14, 2017

Attacks on critical national infrastructure such as power grids, communication networks and the banking sector have massive implications for any country. Disruption to public services, hits to the economy and even loss of life are all potential scenarios…

Tech World logo

LogRhythm Clinches 2017 Frost & Sullivan Asia-Pacific Award

July 7, 2017

LogRhythm has clinched the 2017 Frost & Sullivan Asia-Pacific Enterprise Security Product Line Strategy Leadership Award…

SC Media logo

What breach? AA fails to alert customers after server leaks card data

July 4, 2017

Though the AA’s shop was reportedly leaking payment card data, the motoring association did not alert customers…

My Business logo

Businesses scramble amid new ransomware attack

June 28, 2017

Another devastating ransomware attack has caused havoc worldwide, with security experts again warning SMEs they are a primary target…

Silicon logo

LogRhythm: Cyber security offers strong careers for women in tech

June 28, 2017

Chris Brazdziunas, vice president of products at security intelligence company LogRhythum, discusses women in technology with Silicon…

Professional Security Magazine Online logo

Another ransomware attack

June 28, 2017

In late June another ransomware virus, named Petya, similar to the recent WannaCry attack, spread across the globe, affecting many countries…

Fox News logo

Petya ransomware: Experts tout 'vaccine' to protect computers from crippling cyber attack

June 28, 2017

Security experts say that a digital “vaccine” can protect individual computers from the crippling Petya ransomware…

Bdaily logo

British MPs' passwords leaked

June 26, 2017

Last week, it was revealed that two lists of stolen credentials had been put up for sale or were being traded on Russian-speaking hacking sites…

CSO logo

How security analytics can overcome monitoring bottleneck

June 20, 2017

As enterprise IT infrastructures become increasingly complex, reducing mean-time-to-detect and mean-time-to-respond metrics have become top priorities for every security team…

CIO logo

How to build a highly effective AI team

June 14, 2017

Four organizations share real-world insights into staffing a successful AI effort from the ground up…

Institution of Mechanical Engineers (IMechE) logo

GDPR: What industry needs to know to avoid hefty fines

June 9, 2017

Data protection is vital to any company’s trusted relationship with both customers and suppliers…

The Washington Post logo

How can you protect your right to digital privacy at the border?

June 8, 2017

For travelers, concerns about digital privacy are on the rise…

Baseline logo

University upgrades—and shares—security system

June 5, 2017

The University of Massachusetts implements a centralized network security system and offers it as a managed service to other schools and businesses…

eSecurity Planet logo

OneLogin password manager hacked

June 5, 2017

The identity and access management service OneLogin, which uses Amazon Web Services (AWS) to store customer data, recently announced that an attacker had…

CSO logo

Basic security hygiene blocked WannaCry – but a comprehensive defense needs more

June 5, 2017

It may have sent European businesses scrambling and the security community abuzz, but the WannaCry ransomware attack’s fizzling in the United States and Australia means its legacy will be…

CSO logo

Basic security hygiene blocked WannaCry – but a comprehensive defence needs more

June 2, 2017

It may have sent European businesses scrambling and the security community abuzz, but the WannaCry ransomware attack’s fizzling in the United States and Australia means its legacy will be mostly as a cautionary tale…

SC Media logo

China's controversial cybersecurity law goes into effect

June 2, 2017

China’s new cybersecurity law went into effect on June 1, subjecting companies to stringent data privacy and protection guidelines, even as key questions linger…

CNBC logo

China's new cybersecurity law takes effect today, and many are confused

June 1, 2017

China’s new cybersecurity law takes effect today, and experts are rattled about what it all means…

Yahoo Finanace logo

China's new cybersecurity law is rattling businesses — here's what's really happening

May 31, 2017

The law has been largely touted by Beijing as a milestone in data privacy regulations, but critics say authorities haven’t provided enough information about how the wide-reaching law will be implemented…

Infosecurity Magazine logo

GDPR: One year and counting

May 25, 2017

Today marks exactly 12 months until the European General Data Protection Regulation (GDPR) comes into effect. With just a year to go, it’s now imperative that…

TechNewsWorld logo

Cybersecurity dangerously lax at Mar-a-Lago

May 19, 2017

Internet security at Mar-a-Lago – the private club President Trump owns and has dubbed the “Southern White House” – is weak, ProPublica and Gizmodo reported Wednesday, based on their recent joint investigation…

Computer Weekly logo

WannaCry attack should spur ransomware and XP migration activity

May 15, 2017

The high profile global ransomware attack at the end of last week should get the phones ringing as customers turn to resellers for advice about security and getting off outdated operating systems…

IMechE logo

Experts urge manufacturers to update systems before next ransomware attacks

May 15, 2017

Security experts have urged manufacturing companies to rapidly update ageing control systems following the WannaCry cyber attack, as concerns remain that another attack is imminent…

GSN logo

Trump executive order draws praise from cybersecurity experts

May 12, 2017

President Donald Trump on Thursday signed a long-anticipated executive order calling for the federal government to ramp up its cybersecurity measures…

The Cyberwire logo

US Executive Order on cyber security

May 12, 2017

US President Trump yesterday signed his long-anticipated Executive Order on cyber security. Its sections address…

Channel Life logo

Exclusive: NSP taking LogRhythm SIEM to SMB market with security-as-a-service offering

April 26, 2017

Kiwi network and system integrator NSP is gearing up to launch a new security-as-a-service offering, taking LogRhythm’s security information and event management technology into the SMB market…

Security Brief Asia logo

LogRhythm report casts damning eye on enterprise security tactics

April 26, 2017

LogRhythm’s latest cyber resiliency report casts a damning look into the state of Asia Pacific organizations in Hong Kong, Australia, Singapore and Malaysia…

CSO logo

Cybersecurity industry braces for tighter visa rules

April 21, 2017

The current climate surrounding visas, immigrants and international travel will change the way some tech companies operate, and may harm US cybersecurity…

CSO logo

CSO Perspectives Roadshow interview

April 12, 2017

View the CSO Perspectives Roadshow interview between Bill Taylor, Vice President & General Manager APJ of LogRhythm and CSO’s Anthony Caruana…

Digital Guardian logo

Threat intelligence tips: monitoring, alerts, automation & more

April 3, 2017

18 security professionals share the most important sources of threat intelligence for security teams today…

CNBC logo

The Internet could be down for 24 hours this year

March 26, 2017

Andy Grolnick, president and CEO of LogRhythm, talks about his top cybersecurity predictions this year…

Dark Reading logo

Report: ‘OilRig' attacks expanding across industries, geographies

March 21, 2017

New research released by LogRhythm Labs offers details behind the malware campaign commonly referred to as OilRig…

Security Week logo

Travel agent association breach highlights supply chain threat

March 16, 2017

The Association of British Travel Agents (ABTA) today informed users of a breach that may have affected up to 43,000 customers…

SC Media logo

The role of the ICO in the GDPR

March 8, 2017

Norman Shaw looks at what the latest reports are signaling about the state of readiness for the GDPR, and the role of the ICO…

SDxCentral logo

LogRhythm’s platform thwarts threats by analyzing log data

March 8, 2017

Boulder, Colorado-based security company LogRhythm has developed a software platform that collects, organizes, manages, and analyzes millions to hundreds of millions of pieces of log data…

Helpnet Security logo

The six stages of a cyber attack lifecycle

March 6, 2017

In response to the shortcomings of prevention-centric security strategies, and the challenges of securing an increasingly complex IT environment, organizations…

Bank Info Security logo

Study user behavior to focus intrusion detection

March 3, 2017

Organizations have long sought to reduce their data breach detection time and increase their ability to mitigate breaches more quickly…

CSO logo

Global cybercrime prosecution a patchwork of alliances

March 1, 2017

One of the biggest issues is that unlike traditional bank robbers, who used to try to escape by driving their getaway cars across the state lines, modern cyber-crooks hide overseas…

Computer Weekly logo

How security approaches are evolving in Southeast Asia and beyond

February 8, 2017

Bill Smith, senior vice-president of worldwide field operations at LogRhythm, talks to Computer Weekly about the big shift in cyber security…

CIO Asia logo

Only 45 percent of APAC enterprises proactively conduct cyber risk assessments

February 7, 2017

A survey conducted by Frost & Sullivan polled 400 IT decision makers in Australia, Hong Kong, Malaysia, and Singapore to better understand the cyber resilience of organizations in the region…

Inc. logo

20 ways to attract good luck

January 30, 2017

Check out these quotes from a pile of executives who share their views on how anyone can be luckier…

Computer Weekly logo

UK firms struggling to manage cyber threats, survey shows

January 19, 2017

UK businesses are struggling to detect, prevent and respond to cyber threats, a survey of 2,000 IT professionals from companies of various sizes across 14 industry sectors has revealed…

Dark Reading logo

What to watch for with ransomware: 2017 edition

January 7, 2017

Ransomware will continue to evolve in 2017, bringing new and diverse threats to businesses. What changes are in store?

The San Diego Union Tribune logo

Soaring number of computers hijacked for ransom

January 6, 2017

The FBI said every hour, about 4,000 computers around the world become infected with ransomware. That’s just an estimate…

Business Insider logo

Prediction: The internet will shut down for 24 hours next year

December 21, 2016

It’s December, that time of the year when many industry experts make all sorts of predictions for the year ahead. But one prophecy caught Business Insider’s eye: The whole internet will shut down for 24 hours…

Dubai One logo

Interview with Dubai One TV

December 18, 2016

Mazen Dohaji, MENA Regional Director for LogRhythm, speaks about the impact of cybersecurity attacks on a global level…

The San Diego Union Tribune logo

Cheers and jeers for Obama's hard line against Russian hackers

December 16, 2016

President Barack Obama on Friday indicated that the United States will retaliate against Russia for hacking emails and other material from the Democratic National Committee and the Clinton campaign in an effort to help Donald Trump defeat Hillary Clinton in the presidential election…

eWEEK logo

IT professionals hold little back in reaction to Yahoo breach

December 16, 2016

The pioneering search and web services provider, whose home page starts more browser sessions than anybody in the world, revealed Dec. 14 that new security issues had impacted the personal data of more than 1 billion of its users…

Solutions Review logo

7 SIEM and security analytics vendors to watch in 2017

December 14, 2016

In 2017, IT organizations aren’t just fighting hackers and malware—they’re also battling a torrent of data from their own networks…

TechTarget logo

Building a threat intelligence program? How to avoid the 'feed' frenzy

December 1, 2016

Cyberthreat intelligence is just data if it is not actionable. We offer tips to help your team focus on relevant CTI for faster threat detection and response…

Network World logo

New products of the week 11.28.16

November 28, 2016

This latest version of LogRhythm’s security intelligence and analytics platform features more powerful machine analytics, embedded security automation and orchestration, and enhanced performance at scale…

The San Diego Union Tribune logo

How should Trump handle nation's cybersecurity problems?

November 28, 2016

Hackers are everywhere, causing ever more problems, leading many to ask: How should Donald Trump deal with cybersecurity when he becomes president on Jan. 20? It’s an issue he might have to address almost immediately…

Third Certainty logo

Machine learning underlying SIEM systems gets smarter at neutralizing cyber threats

November 23, 2016

ThirdCertainty recently spoke to LogRhythm co-founder and CTO, Chris Petersen, about the machine learning underlying SIEM detection capabilities…

The Denver Post logo

Is Windows 10’s built-in security good enough?

November 21, 2016

Built into the operating system is a program called Windows Defender. This is Windows’ version of anti-virus software that is geared toward not only protecting against dangerous files but also dangerous behaviors…

The Denver Post logo

Why Microsoft Outlook and other e-mail services know the motel you’re staying at

November 14, 2016

There are two types of companies in the world: Those that know they’ve been hacked and those that don’t. But in this case, there appears to be a third: people who use e-mail…

The Denver Post logo

When a cyber stranger wants $300 in iTunes gift cards to fix your PC, please question it

November 7, 2016

Let’s start with obvious: strangers — especially cyber strangers. Huge red flag when they demand money…

The Denver Post logo

Messing with telemarketers — just don’t do it, say security experts

October 31, 2016

Before taunting them, it’s important to note that they already have your phone number, name, and possibly other identifying information. This data could be used to cause real harm to you or your family, so it is ill-advised…

The San Diego Union Tribune logo

Analysts worry that last week's cyber attack was a 'trial run'

October 26, 2016

Security experts say that the big cyber attack that hit Twitter, Paypal, Netflix, Airbnb and dozens of other companies last week could be a precursor to a larger assault that deeply impacts American society, possibly during the holiday shopping season…

CSO logo

IoT, health and other data creates massive value

October 25, 2016

With about five billion IoT devices connected today, with growth expected to reach 25 to 38 billion over the next five years it’s clear something needs to be done to arrest the threat of billions of devices being recruited for nefarious purposes…

TIME logo

How Web Cams Helped Bring Down the Internet, Briefly

October 25, 2016

In a world where we increasingly live and work in giant webs of internet connectivity—our computers and phones, not to mention cameras, thermostats, garage door openers, kitchen appliances and baby monitors are all now connected to the web, often by default…

Yahoo Finance logo

LogRhythm Announces New Global Resale Partnership

October 25, 2016

LogRhythm today announced that it has formed a worldwide resale partnership with Dell EMC. This partnership reflects a long history of collaboration between the two companies, as LogRhythm is one of Dell EMC’s largest OEM customers…

ITP.net logo

StarLink adds security intelligence and analytics vendor

October 11, 2016

Security-specialised VAD StarLink, has signed a distribution agreement with LogRhythm, a global provider of security intelligence and analytics solutions…

CBR logo

IoT security – the next big cybersecurity issue has arrived

October 10, 2016

According to market watcher Gartner, there will be nearly 26 billion devices on the Internet of Things by 2020. It is also predicted that over 25 percent of identified attacks in enterprises will involve IoT…

TCF Newswire logo

LogRhythm to address Middle East's growing cybersecurity needs

October 6, 2016

LogRhythm is showcasing its Security Intelligence and Analytics Platform at this year’s installment of GITEX…

IBTimes logo

Yahoo hack: Could data breach scupper Verizon deal?

September 23, 2016

Yahoo’s admission that a “state-sponsored actor” successfully stole account information related to 500 million of users from its computer networks in late 2014 could have serious implications for the deal between the internet firm and its future parent company, Verizon…

The Washington Times logo

Yahoo confirms massive data breach; at least 500 million accounts affected

September 22, 2016

Yahoo officially revealed Thursday that the personal details of more than 500 million account holders were compromised as the result of a security breach being blamed by the company on government-hired hackers…

IT Pro logo

Nine in ten companies hacked in last five years

September 20, 2016

Research by Lloyds of London has revealed that 92% of businesses have experienced a data breach in the last five years, yet CEOs are not concerned this could be a sign of things to come, expressing to the insurance market…

IT Wire logo

LogRhythm talks next-gen security, fighting ransomware and more

September 7, 2016

At the recent Gartner Security and Risk Management Summit, I caught up with the company’s CMO, Mike Regan, to talk about LogRhythm’s latest security solutions…

The Business Times logo

EDBI invests in US cybersecurity firm LogRhythm

August 31, 2016

EDBI, the investment arm of the Singapore Economic Development Board (EDB), has taken part in a US$50 million funding round into LogRhythm, a Colorado-based security intelligence and analytics firm…

Reuters logo

Cyber security firm LogRhythm raises $50 million after changing IPO plans

August 30, 2016

Cyber security company LogRhythm has raised $50 million from private investors after postponing plans for an initial public offering late last year, the company said on Tuesday, the latest sign of how austere the IPO market has become for some technology start-ups…

The Denver Post logo

LogRhythm’s user-friendly approach to cybersecurity attracts $50 million

August 30, 2016

Fast-growing LogRhythm is expected to announce Tuesday that it raised another $50 million from investors to speed up its global expansion to help large companies fight cyber attacks…

CSO logo

Why the death of SIEM has been greatly exaggerated

August 29, 2016

SIEM is not only alive and well, it’s also being put to work by small and mid-sized firms in increasing numbers. They are seeing value in the ability to proactively monitor their growing IT infrastructures and spot threats before they can cause disruption…

TechCrunch logo

How data science fights modern insider threats

August 25, 2016

Insider threats are the biggest cybersecurity threats to firms, organizations and government agencies. This is something you hear a lot at security conference keynotes and read about in data breach reports…

Network World logo

New products of the week 8.8.16

August 8, 2016

LogRhythm’s NetMon Freemium is featured by Network World as an intriguing new product…

Silicon Valley Watcher logo

Cybersecurity Costs - An Unsustainable Tax On Business

August 4, 2016

The cost of cybersecurity has become a burdensome tax on business and with 1.5 million IT security jobs unfilled, US corporations are losing to sophisticated criminal gangs, said security experts at a recent event in San Francisco…

Fox News logo

Wikileaks DNC email dump sparks malware fears

July 29, 2016

The trove of leaked Democratic National Committee emails posted to Wikileaks on July 22 has sparked concerns about malware as users access the vast trove of documents. WikiLeaks posted close to 20,000 emails and 8,000 attachments…

ZDNet logo

Cybersecurity is becoming an unsustainable tax on business

July 28, 2016

The annual costs of cybersecurity are doubling for some firms as huge data breaches force them to hire specialists and buy more software…

CIO logo

Doing business with Simon Howe of LogRhythm: Know thyself, empower your team

July 27, 2016

We’re focused on protecting against today’s rapidly evolving threat landscape which requires broad and deep visibility across the IT environment. LogRhythm provides profound visibility into threats and risks to which organisations are otherwise blind. Designed to help prevent breaches before they happen…

CNBC logo

2016 GOP platform endorsing strike-back against hackers

July 27, 2016

While the notion of hoisting cybercriminals upon their own petard is undeniably appealing, experts in the fields of security and technology told CNBC that “hacking back” is little more than a pipe dream…

Computer Business Review logo

Five steps to defend against a ransomware attack

July 11, 2016

Understanding what happens at each phase of a ransomware attack, and knowing the indicators of compromise [IOCs] to look for, increases the likelihood of being able to successfully defend against—or at least mitigate the effects of—an attack…

DNA logo

LogRhythm opens regional Hq in Singapore to build on momentum

July 6, 2016

Security intelligence and analytics company LogRhythm has announced the opening of its new Asia Pacific and Japan (APJ) headquarters in Singapore to support a growing demand for security intelligence solutions. LogRhythm opened its first office in Singapore in 2014 and has since expanded into Sydney, Melbourne, Hong Kong and Malaysia…

Security Management logo

Patient Zero

July 1, 2016

Ransomware had compromised the $5 billion health-care provider that operates 10 hospitals and more than 250 outpatient facilities in the Washington, D.C., region, serving thousands of patients and employing more than 30,000. While exact details were not released before Security Management’s press time, attackers hit MedStar on the morning of March 28, launching an attack that prevented certain users from logging in to its systems…

IT Pro Portal logo

Mitigating the insider threat to your business

June 25, 2016

This year, we have seen a steady flow of high profile data breaches hitting the headlines. Whether the result of unknown web vulnerabilities, DDOS attacks or overall lax corporate data security policies, data breaches are becoming an everyday occurrence. In fact, it is generally agreed that no organization is safe and that hackers will get in – but they can be stopped before they cause damage…

CSO logo

Next-generation SIEM turns low-level security monitoring for high-level business goals

June 16, 2016

Despite an initial rush to adopt security and information event management (SIEM) tools, complex implementations and a lack of skilled staff left many companies struggling to use SIEM effectively. That’s all set to change, however, as a new generation of SIEM tools…

CSO logo

Ransomware explosion is the latest security wakeup call for CxOs

June 16, 2016

The massive data breach of US retailer Target was a wakeup call for senior business executives too often disengaged with cybersecurity issues, but surging ransomware attacks are honing CxOs’ attention on the need for automated analytics tools to detect security breaches as they happen – rather than months later, or not at all…

The Straits Times logo

Not uncommon' to limit Internet access, say experts

June 11, 2016

Pulling the plug on Internet access on work computers is not uncommon in the private sector, say cyber-security experts and industry players, particularly in areas that deal with extra-sensitive information. These include the defence, financial and healthcare industries, but to varying degrees depending on the nature of the work employees do……

Channel NewsAsia logo

No Internet access for public officers’ work computers by next June

June 8, 2016

To guard against cyberattacks over the Internet and create a more secure working environment, the work computers of public officers will have no access to the Internet from next June. Channel NewsAsia speaks to Bill Taylor-Mountford who shares insights…

Bloomberg TV Malaysia logo

Malaysian Banks Not Immune to Cyber Threats

June 8, 2016

Cyber crimes cost the world up to half a trillion dollars a year and Malaysian banks are as much at risk as its global peers, says Bill Taylor-Mountford from security intelligence firm LogRhythm. He speaks to Bloomberg TV Malaysia’s Han Tan and shares how organizations in Malaysia can go beyond regulations and compliance to defend themselves against cyber threats…

Forbes logo

Cybersecurity Startups Set For Surge

June 7, 2016

Venture capital investment in cyberphysical security startups rose 78% to $228 million in 2015, and will rise to S400 million in 2016 as rapid adoption of the Internet of Things (IoT) raises the threat to products such as connected cars, smart homes and future factories, according to Lux Research…

Security Brief AU logo

Exclusive: New strategies to combat cyber attacks, from LogRhythm

May 31, 2016

Some SMEs are are paying lip service to cyber security, opening themselves up to being just another statistic in the malicious cyber crime game. That’s according to Bill Smith, LogRhythm Senior Vice President of Worldwide Field Operations and Bill Taylor, LogRhythm Vice President of Asia Pacific and Japan…

Built in Colorado logo

Before they were CEOs: what 4 Colorado tech leaders studied in college

May 24, 2016

We were curious how Colorado tech leaders got their start — from their childhood hopes to where they went to college — and it turns out, these four brought some pretty interesting lessons with them on their way to the top…

IT Pro Portal logo

GDPR gains EU approval: Industry reaction and analysis

April 15, 2016

Yesterday it was announced that the European Parliament officially approved the new Global Data Protection Regulations (GDPR), unifying Europe’s multiple data protection regulations into one common law…

The Register logo

Europe's new privacy safeguards are finally approved, must invade EU nations by 2018

April 14, 2016

The final seal of approval follows successful passage through the EU Parliament’s Committee on Civil Liberties, Justice and Home Affairs. Following four years of discussions and amendments, the GDPR is now officially EU law and will directly apply in all EU countries, replacing ageing EU and national data protection legislation…

Tech Week Europe logo

European Parliament Approves GDPR Data Protection Law

April 14, 2016

The European Parliament has officially approved the General Data Protection Regulation (GDPR) in Strasbourg, after more than four years of negotiations. The GDPR has been in the planning since January 2012, and it aims to give citizens back control over their data in the digital age, including the right to be forgotten. It also…

SC Media logo

European Parliament approves GDPR

April 14, 2016

After four years of work the much vaunted GDPR has been approved by the European Parliament, aiming to usher in a new age of data protection for European citizens and the companies that serve them…

Tech Republic logo

LogRhythm mashes up security and big data to give SMBs better defense in one tool

April 6, 2016

Security Intelligence Management (SIM) can even the playing field between IT and cybersecurity attackers. Here’s how one of the leaders in the space offers a real-time battle strategy…

Healthcare Info Security logo

Ransomware: Time for a HIPAA Update?

March 29, 2016

The recent surge in ransomware attacks on hospitals has at least one member of Congress contemplating whether HIPAA’s breach notification requirements need to be clarified or updated to reflect the trend…

Healthcare Info Security logo

MedStar Shuts Systems After Cyberattack

March 29, 2016

A March 28 cyberattack that may have involved ransomware forced MedStar Health, a 10-hospital system serving Maryland and the Washington, D.C. area, to shut down many of its systems to avoid the spread of the malware…

IT Wire logo

Harnessing your inner SIEM

March 21, 2016

The buzzword in 2015 was cyber threat intelligence (CTI) - everyone wanted useful data and analytical tools for next-gen cyber security to detect and respond to threats faster. The industry responded by providing a plethora of CTI products. Matt Willems, a four-year Labs Engineer at LogRhythm, has written a good overview of CTI and SIEM…

Biz West logo

LogRhythm expanding Boulder presence to accommodate growth

March 16, 2016

Fast-growing cybersecurity firm LogRhythm Inc. is adding more real estate in Boulder, with another 50 employees expected to come onboard locally this year…

The Times logo

Former worker stole secret market data, Ofcom admits

March 11, 2016

The media regulator Ofcom has been forced to tell broadcasters that one of its former employees stole a considerable amount of confidential market information from its database and passed it on to his new employer…

City A.M. logo

An ex-Ofcom employee stole commercially sensitive data about the UK's major TV broadcasters – and then offered it to one of them

March 10, 2016

Ofcom has admitted that a former employee stole data from the regulator exposing commercially sensitive information about the UK’s biggest TV companies…

Help Net Security logo

UK businesses fail at security awareness

March 7, 2016

UK organizations are putting their reputation, customer trust and competitive advantage at greater risk by failing to provide their staff with effective security awareness and capability to defend against cyber attacks…

CNET logo

Not in my house: Amazon's unencrypted devices a sitting target, cybersecurity experts say

March 4, 2016

The news landed like a record scratch Thursday, when security industry heavyweights gathered at the RSA conference in San Francisco heard Amazon plans to stop protecting the data customers store on its tablets and other devices with a technology called encryption…

SC Media logo

Only 28% of cyber-attacks are reported by UK biz

March 4, 2016

Research from the Institute of Directors (IoD) and Barclays says that only 43 percent of the nearly 1,000 IoD members polled know where their data is physically stored. The research said, “This is a truly frightening statistic. It effectively means businesses are losing control of their organisation’s data which may well be the biggest asset of a business.” One fourth of the respondents…

ExecutiveBiz logo

Lockheed Martin adds LogRhythm to cybersecurity alliance

March 1, 2016

Lockheed Martin will work with LogRhythm on cybersecurity systems integration pilot programs after the latter signed up for the Lockheed Martin Cyber Security Alliance…

Lockheed Martin logo

LogRhythm joins Lockheed Martin cybersecurity alliance

February 29, 2016

Lockheed Martin (NYSE: LMT) announced the addition of LogRhythm, a leader in security intelligence and analytics, to the Lockheed Martin Cyber Security Alliance. Alliance members collaborate to solve growing cybersecurity needs and meet future threats through customer-focused solution design, experiments, and end-to-end systems integration pilots…

AP logo

Los Angeles hospital attack concerns cybersecurity experts

February 18, 2016

Cybersecurity experts worry that the $17,000 a Los Angeles hospital paid hackers to regain control of its computers could signal a troubling escalation of the growing ransomware threat…

DNA logo

Critical infrastructure: A clear and present danger

February 17, 2016

Critical infrastructure like power grids and water supplies has been the target of many theoretical cyber-attacks by academics and white hat hackers for years now, but with the recent shutdown of a power plant in Ukraine by hackers, this threat has now crossed from white-paper territory and into the real world…

IT Pro Portal logo

Massive web vulnerability puts devices at risk

February 17, 2016

A catastrophic flaw in one of the Internet’s core building blocks may bring a huge amount of apps and hardware devices vulnerable to attacks, according to researchers. A function performing domain-name lookups called getaddrinfo(), contains a buffer overflow bug that allows attackers to remotely execute malicious code. It can be exploited…

Computerworld Singapore logo

Cybersecurity in Asia: Keep your castle safe

January 25, 2016

When it comes to a cyber-attack, it is no longer a question of if your company will be hacked but when. Companies from 2 to 10,000 will get hacked. There’s no question. If you think that’s bad news, then consider this…

Biospectrum logo

Cybersecurity challenge for digitally connected healthcare

January 22, 2016

As technology drives a revolutionary transformation in the healthcare industry buoyed by the latest innovations in cloud computing, analytics, Internet of Things and other disruptive tech trends, healthcare service providers, including insurers, are rapidly becoming targets of cybercriminals. In fact, the cost of healthcare data breaches could reach $5.6 billion in 2015 according to Experian’s forecast…

WashingtonExec logo

NIAP Common Criteria Certification Awarded to LogRhythm’s v6.3.4 SIEM Platform

January 20, 2016

It was announced on January 12th by security intelligence company, LogRhythm that it has been granted the National Information Assurance Partnership (NIAP) Common Criteria Certification for its v6.3.4 SIEM platform…

TechBeacon logo

Takeaways from the latest Gartner Magic Quadrant for SIEM

January 20, 2016

With data breaches making news daily, organizations are looking for effective ways to protect their digital resources…

CSO logo

Which certifications matter most for those new to security

January 13, 2016

Certifications do matter, but an extensive list of certs with no hands-on learning to show that you can apply and utilize that knowledge won’t bode well in many interviews…

Network World logo

The Incident Response Fab Five

January 11, 2016

CISOs should consider and coordinate incident detection and response in five areas: hosts, networks, threat intelligence, user behavior monitoring, and process automation…

Electronic Health Reporter logo

Healthcare IT predictions for 2016

January 8, 2016

Guest post by James Carder, CISO of LogRhythm, VP of LogRhythm Labs…

Sample alt text
A caption for this media

Transform your physical or virtual system into a network forensics sensor in a matter of minutes for free with NetMon Freemium. Your investigations will come together effortlessly with extensive corresponding metadata, full packet capture, and customizable advanced correlation.

Sample alt text
A caption for this media

Transform your physical or virtual system into a network forensics sensor in a matter of minutes for free with NetMon Freemium. Your investigations will come together effortlessly with extensive corresponding metadata, full packet capture, and customizable advanced correlation. Transform your physical or virtual system into a network forensics sensor in a matter of minutes for free with NetMon Freemium. Your investigations will come together effortlessly with extensive corresponding metadata, full packet capture, and customizable advanced correlation. Transform your physical or virtual system into a network forensics sensor in a matter of minutes for free with NetMon Freemium. Your investigations will come together effortlessly with extensive corresponding metadata, full packet capture, and customizable advanced correlation.

A caption for that media

Informative text content. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.

Sample alt text 2
Another caption

Transform your physical or virtual system into a network forensics sensor in a matter of minutes for free with NetMon Freemium. Your investigations will come together effortlessly with extensive corresponding metadata, full packet capture, and customizable advanced correlation.