In the News

Chris Martin, principal sales engineer at LogRhythm, comes live from InformationWeek News Desk at InterOp 2017 to discuss Threat Lifecycle Management and the importance of investing in detection and response capabilities.


Featured Articles

Built In Colorado logo

At LogRhythm, people ride inner tubes to
work—and help clients fight cyberattacks

September 25, 2017

Boulder-based LogRhythm is on a roll. Since its 2003 founding, the company has melded multiple technologies into a user-friendly platform that detects and responds to cyber threats and attacks…

SC Media logo

The Dark Overlord cybergang threatens kids in its latest attack

September 21, 2017

A cyber gang calling itself The Dark Overlord Solution late last week sent an unusually threatening ransom note to the Columbia Falls school district forcing officials to shutter its schools to ensure the safety of the students…

USA Today logo

How did the Equifax breach happen? Here are some answers and some questions.

September 14, 2017

Nearly half of all Americans are affected by a cyber security breach at Equifax, one of the nation’s three major credit-reporting agencies. Here’s how to avoid being a victim…

Denver Post logo

Clearing up confusion on the Equifax data breach, no thanks to Equifax

September 8, 2017

What the hack happened is unclear, but best to live like your personal data was stolen…

Built In Colorado logo

Why this security vet tapped a physicist to get LogRhythm off the ground

August 24, 2017

During the dot-com boom of the 90s, Chris Petersen could see that increased demand for cybersecurity was on the horizon. So, too, was the need for security analysts to detect and respond to threats rapidly…

CIO UK logo

Threat Lifecycle Management: The key to combatting sophisticated threats

August 15, 2017

In response to the shortcomings of prevention-centric security strategies and the challenges of securing an increasingly complex and open IT environment, many organizations should be shifting their resources and focusing towards strategies centered on threat detection and response…

eSecurity Planet logo

The importance of effective incident response: The HBO breach expands

August 9, 2017

The hackers behind the recent breach at HBO have posted additional stolen data online, including Game of Thrones script summaries and several emails from an HBO executive’s inbox, according to the Hollywood Reporter…

CEO Today logo

How can AI help us fight cyber crime?

August 8, 2017

How better to fight cybercrime than with today’s top cyber technology, AI; fighting fire with fire. Ross Brewer, Vice President and Managing Director at LogRhythm explains the ins and outs of artificial intelligence…

SC Media logo

£17 million fines for CNI companies under proposed EU SNIS plans

August 8, 2017

Under an (NIS) directive being adopted by the UK, CNI providers will face fines of £17 million or up to four percent of annual turnover if they fail to protect critical infrastructure from loss of services due to cyber-attacks…

SC Media logo

HBO breach accomplished with hard work by hacker, poor security practices by victim

August 8, 2017

Cybersecurity executives are speculating the HBO hack by “Mr. Smith” was the result of the intruder putting in a tremendous amount of effort to infiltrate the entertainment giant…

SC Media logo

HBO hacked: Game of Thrones, Ballers, Room 104 content involved

August 1, 2017

Entertainment Weekly reported that hackers claimed to have taken 1.5TB of data from HBO…

The Straits Times logo

Moving into a job in cyber security at 63

July 24, 2017

Madam Ivy Lim, who landed her new job in March, has lost no time in becoming software firm LogRhythm’s best-performing telesales employee in the region…

Business Reporter logo

A new approach to cyber security is required

July 17, 2017

Victims of damaging cyber breaches make the news every week – don’t become one of them…

CSO logo

Protecting critical infrastructure in an IoT world

July 14, 2017

Attacks on critical national infrastructure such as power grids, communication networks and the banking sector have massive implications for any country. Disruption to public services, hits to the economy and even loss of life are all potential scenarios…

SC Media logo

LogRhythm Clinches 2017 Frost & Sullivan Asia-Pacific Award

July 7, 2017

LogRhythm has clinched the 2017 Frost & Sullivan Asia-Pacific Enterprise Security Product Line Strategy Leadership Award…

SC Media logo

What breach? AA fails to alert customers after server leaks card data

July 4, 2017

Though the AA’s shop was reportedly leaking payment card data, the motoring association did not alert customers…

My Business logo

Businesses scramble amid new ransomware attack

June 28, 2017

Another devastating ransomware attack has caused havoc worldwide, with security experts again warning SMEs they are a primary target…

Silicon logo

LogRhythm: Cyber security offers strong careers for women in tech

June 28, 2017

Chris Brazdziunas, vice president of products at security intelligence company LogRhythum, discusses women in technology with Silicon…

Professional Security Magazine Online logo

Another ransomware attack

June 28, 2017

In late June another ransomware virus, named Petya, similar to the recent WannaCry attack, spread across the globe, affecting many countries…

Fox News logo

Petya ransomware: Experts tout ‘vaccine’ to protect computers from crippling cyber attack

June 28, 2017

Security experts say that a digital “vaccine” can protect individual computers from the crippling Petya ransomware…

Bdaily logo

British MPs’ passwords leaked

June 26, 2017

Last week, it was revealed that two lists of stolen credentials had been put up for sale or were being traded on Russian-speaking hacking sites…

CSO logo

How security analytics can overcome monitoring bottleneck

June 20, 2017

As enterprise IT infrastructures become increasingly complex, reducing mean-time-to-detect and mean-time-to-respond metrics have become top priorities for every security team…

CIO logo

How to build a highly effective AI team

June 14, 2017

Four organizations share real-world insights into staffing a successful AI effort from the ground up…

IMechE logo

GDPR: What industry needs to know to avoid hefty fines

June 9, 2017

Data protection is vital to any company’s trusted relationship with both customers and suppliers…

The Washington Post logo

How can you protect your right to digital privacy at the border?

June 8, 2017

For travelers, concerns about digital privacy are on the rise…

Baseline logo

University upgrades—and shares—security system

June 5, 2017

The University of Massachusetts implements a centralized network security system and offers it as a managed service to other schools and businesses…

eSecurity Planet logo

OneLogin password manager hacked

June 5, 2017

The identity and access management service OneLogin, which uses Amazon Web Services (AWS) to store customer data, recently announced that an attacker had…

CSO logo

Basic security hygiene blocked WannaCry – but a comprehensive defense needs more

June 5, 2017

It may have sent European businesses scrambling and the security community abuzz, but the WannaCry ransomware attack’s fizzling in the United States and Australia means its legacy will be…

CSO logo

Basic security hygiene blocked WannaCry – but a comprehensive defence needs more

June 2, 2017

It may have sent European businesses scrambling and the security community abuzz, but the WannaCry ransomware attack’s fizzling in the United States and Australia means its legacy will be mostly as a cautionary tale…

SC Media logo

China’s controversial cybersecurity law goes into effect

June 2, 2017

China’s new cybersecurity law went into effect on June 1, subjecting companies to stringent data privacy and protection guidelines, even as key questions linger…

CNBC logo

China’s new cybersecurity law takes effect today, and many are confused

June 1, 2017

China’s new cybersecurity law takes effect today, and experts are rattled about what it all means….

Yahoo Finanace logo

China’s new cybersecurity law is rattling businesses — here’s what’s really happening

May 31, 2017

The law has been largely touted by Beijing as a milestone in data privacy regulations, but critics say authorities haven’t provided enough information about how the wide-reaching law will be implemented…

Infosecurity Magazine logo

GDPR: One year and counting

May 25, 2017

Today marks exactly 12 months until the European General Data Protection Regulation (GDPR) comes into effect. With just a year to go, it’s now imperative that…

TechNewsWorld logo

Cybersecurity dangerously lax at Mar-a-Lago

May 19, 2017

Internet security at Mar-a-Lago – the private club President Trump owns and has dubbed the “Southern White House” – is weak, ProPublica and Gizmodo reported Wednesday, based on their recent joint investigation…

Computer Weekly logo

WannaCry attack should spur ransomware and XP migration activity

May 15, 2017

The high profile global ransomware attack at the end of last week should get the phones ringing as customers turn to resellers for advice about security and getting off outdated operating systems…

IMechE logo

Experts urge manufacturers to update systems before next ransomware attacks

May 15, 2017

Security experts have urged manufacturing companies to rapidly update ageing control systems following the WannaCry cyber attack, as concerns remain that another attack is imminent…

GSN logo

Trump executive order draws praise from cybersecurity experts

May 12, 2017

President Donald Trump on Thursday signed a long-anticipated executive order calling for the federal government to ramp up its cybersecurity measures…

Cyberwire logo

US Executive Order on cyber security

May 12, 2017

US President Trump yesterday signed his long-anticipated Executive Order on cyber security. Its sections address…

Channel Life logo

Exclusive: NSP taking LogRhythm SIEM to SMB market with security-as-a-service offering

April 26, 2017

Kiwi network and system integrator NSP is gearing up to launch a new security-as-a-service offering, taking LogRhythm’s security information and event management technology into the SMB market…

Security Brief Asia logo

LogRhythm report casts damning eye on enterprise security tactics

April 26, 2017

LogRhythm’s latest cyber resiliency report casts a damning look into the state of Asia Pacific organizations in Hong Kong, Australia, Singapore and Malaysia…

CSO logo

Cybersecurity industry braces for tighter visa rules

April 21, 2017

The current climate surrounding visas, immigrants and international travel will change the way some tech companies operate, and may harm US cybersecurity…

logo

CSO Perspectives Roadshow interview

April 12, 2017

View the CSO Perspectives Roadshow interview between Bill Taylor, Vice President & General Manager APJ of LogRhythm and CSO’s Anthony Caruana…

Digital Guardian logo

Threat intelligence tips: monitoring, alerts, automation & more

April 3, 2017

18 security professionals share the most important sources of threat intelligence for security teams today…

CNBC logo

The Internet could be down for 24 hours this year

March 26, 2017

Andy Grolnick, president and CEO of LogRhythm, talks about his top cybersecurity predictions this year…

Dark Reading logo

Report: ‘OilRig’ attacks expanding across industries, geographies

March 21, 2017

New research released by LogRhythm Labs offers details behind the malware campaign commonly referred to as OilRig…

Security Week logo

Travel agent association breach highlights supply chain threat

March 16, 2017

The Association of British Travel Agents (ABTA) today informed users of a breach that may have affected up to 43,000 customers…

SC Media logo

The role of the ICO in the GDPR

March 8, 2017

Norman Shaw looks at what the latest reports are signaling about the state of readiness for the GDPR, and the role of the ICO…

SDxCentral logo

LogRhythm’s platform thwarts threats by analyzing log data

March 8, 2017

Boulder, Colorado-based security company LogRhythm has developed a software platform that collects, organizes, manages, and analyzes millions to hundreds of millions of pieces of log data…

Helpnet Security logo

The six stages of a cyber attack lifecycle

March 6, 2017

In response to the shortcomings of prevention-centric security strategies, and the challenges of securing an increasingly complex IT environment, organizations…

Bank Info Security logo

Study user behavior to focus intrusion detection

March 3, 2017

Organizations have long sought to reduce their data breach detection time and increase their ability to mitigate breaches more quickly…

CSO logo

Global cybercrime prosecution a patchwork of alliances

March 1, 2017

One of the biggest issues is that unlike traditional bank robbers, who used to try to escape by driving their getaway cars across the state lines, modern cyber-crooks hide overseas…

ComputerWeekly.com logo

How security approaches are evolving in Southeast Asia and beyond

February 8, 2017

Bill Smith, senior vice-president of worldwide field operations at LogRhythm, talks to Computer Weekly about the big shift in cyber security…

CIO Asia logo

Only 45 percent of APAC enterprises proactively conduct cyber risk assessments

February 7, 2017

A survey conducted by Frost & Sullivan polled 400 IT decision makers in Australia, Hong Kong, Malaysia, and Singapore to better understand the cyber resilience of organizations in the region…

Inc. logo

20 ways to attract good luck

January 30, 2017

Check out these quotes from a pile of executives who share their views on how anyone can be luckier…

ComputerWeekly.com logo

UK firms struggling to manage cyber threats, survey shows

January 19, 2017

UK businesses are struggling to detect, prevent and respond to cyber threats, a survey of 2,000 IT professionals from companies of various sizes across 14 industry sectors has revealed.

DarkReading logo

What to watch for with ransomware: 2017 edition

January 7, 2017

Ransomware will continue to evolve in 2017, bringing new and diverse threats to businesses. What changes are in store?

San Diego Union Tribune logo

Soaring number of computers hijacked for ransom

January 6, 2017

The FBI said every hour, about 4,000 computers around the world become infected with ransomware. That’s just an estimate…

Business Insider logo

Prediction: The internet will shut down for 24 hours next year

December 21, 2016

It’s December, that time of the year when many industry experts make all sorts of predictions for the year ahead. But one prophecy caught Business Insider’s eye: The whole internet will shut down for 24 hours…

Dubai One logo

Interview with Dubai One TV

December 18, 2016

Mazen Dohaji, MENA Regional Director for LogRhythm, speaks about the impact of cybersecurity attacks on a global level…

San Diego Union Tribune logo

Cheers and jeers for Obama’s hard line against Russian hackers

December 16, 2016

President Barack Obama on Friday indicated that the United States will retaliate against Russia for hacking emails and other material from the Democratic National Committee and the Clinton campaign in an effort to help Donald Trump defeat Hillary Clinton in the presidential election…

wWEEK logo

IT professionals hold little back in reaction to Yahoo breach

December 16, 2016

The pioneering search and web services provider, whose home page starts more browser sessions than anybody in the world, revealed Dec. 14 that new security issues had impacted the personal data of more than 1 billion of its users…

Solutions Review logo

7 SIEM and security analytics vendors to watch in 2017

December 14, 2016

In 2017, IT organizations aren’t just fighting hackers and malware—they’re also battling a torrent of data from their own networks…

TechTarget logo

Building a threat intelligence program? How to avoid the ‘feed’ frenzy

December 1, 2016

Cyberthreat intelligence is just data if it is not actionable. We offer tips to help your team focus on relevant CTI for faster threat detection and response…

NetworkWorld logo

New products of the week 11.28.16

November 28, 2016

This latest version of LogRhythm’s security intelligence and analytics platform features more powerful machine analytics, embedded security automation and orchestration, and enhanced performance at scale…

San Diego Union Tribune logo

How should Trump handle nation’s cybersecurity problems?

November 28, 2016

Hackers are everywhere, causing ever more problems, leading many to ask: How should Donald Trump deal with cybersecurity when he becomes president on Jan. 20? It’s an issue he might have to address almost immediately…

Third Certainty logo

Machine learning underlying SIEM systems gets smarter at neutralizing cyber threats

November 23, 2016

ThirdCertainty recently spoke to LogRhythm co-founder and CTO, Chris Petersen, about the machine learning underlying SIEM detection capabilities…

Denver Post logo

Is Windows 10’s built-in security good enough?

November 21, 2016

Built into the operating system is a program called Windows Defender. This is Windows’ version of anti-virus software that is geared toward not only protecting against dangerous files but also dangerous behaviors…

Denver Post logo

Why Microsoft Outlook and other e-mail services know the motel you’re staying at

November 14, 2016

There are two types of companies in the world: Those that know they’ve been hacked and those that don’t. But in this case, there appears to be a third: people who use e-mail…

Denver Post logo

When a cyber stranger wants $300 in iTunes gift cards to fix your PC, please question it

November 7, 2016

Let’s start with obvious: strangers — especially cyber strangers. Huge red flag when they demand money…

Denver Post logo

Messing with telemarketers — just don’t do it, say security experts

October 31, 2016

Before taunting them, it’s important to note that they already have your phone number, name, and possibly other identifying information. This data could be used to cause real harm to you or your family, so it is ill-advised…

The San Diego Union-Tribune logo

Analysts worry that last week’s cyber attack was a ‘trial run’

October 26, 2016

Security experts say that the big cyber attack that hit Twitter, Paypal, Netflix, Airbnb and dozens of other companies last week could be a precursor to a larger assault that deeply impacts American society, possibly during the holiday shopping season…

CSO logo

​IoT, health and other data creates massive value

October 25, 2016

With about five billion IoT devices connected today, with growth expected to reach 25 to 38 billion over the next five years it’s clear something needs to be done to arrest the threat of billions of devices being recruited for nefarious purposes…

TIME logo

How Web Cams Helped Bring Down the Internet, Briefly

October 25, 2016

In a world where we increasingly live and work in giant webs of internet connectivity—our computers and phones, not to mention cameras, thermostats, garage door openers, kitchen appliances and baby monitors are all now connected to the web, often by default…

Yahoo Finance logo

LogRhythm Announces New Global Resale Partnership

October 25, 2016

LogRhythm today announced that it has formed a worldwide resale partnership with Dell EMC. This partnership reflects a long history of collaboration between the two companies, as LogRhythm is one of Dell EMC’s largest OEM customers…

ITP logo

StarLink adds security intelligence and analytics vendor

October 11, 2016

Security-specialised VAD StarLink, has signed a distribution agreement with LogRhythm, a global provider of security intelligence and analytics solutions…

CBR logo

IoT security – the next big cybersecurity issue has arrived

October 10, 2016

According to market watcher Gartner, there will be nearly 26 billion devices on the Internet of Things by 2020. It is also predicted that over 25 percent of identified attacks in enterprises will involve IoT…

TCF Newswire logo

LogRhythm to address Middle East’s growing cybersecurity needs

October 6, 2016

LogRhythm is showcasing its Security Intelligence and Analytics Platform at this year’s installment of GITEX…

IBTimes logo

Yahoo hack: Could data breach scupper Verizon deal?

September 23, 2016

Yahoo’s admission that a “state-sponsored actor” successfully stole account information related to 500 million of users from its computer networks in late 2014 could have serious implications for the deal between the internet firm and its future parent company, Verizon…

The Washington Times logo

Yahoo confirms massive data breach; at least 500 million accounts affected

September 22, 2016

Yahoo officially revealed Thursday that the personal details of more than 500 million account holders were compromised as the result of a security breach being blamed by the company on government-hired hackers…

Misco logo

Majority of companies have experienced a hack in the last five years

September 21, 2016

In the last five years, the majority of businesses (92%) have experienced a data breach, new research by Lloyds of London reveals. Despite this, CEOs remain unconcerned about becoming the subject of another attack in the future, IT Pro reports…

IT Pro logo

Nine in ten companies hacked in last five years

September 20, 2016

Research by Lloyds of London has revealed that 92% of businesses have experienced a data breach in the last five years, yet CEOs are not concerned this could be a sign of things to come, expressing to the insurance market…

iTWire logo

LogRhythm talks next-gen security, fighting ransomware and more

September 7, 2016

At the recent Gartner Security and Risk Management Summit, I caught up with the company’s CMO, Mike Regan, to talk about LogRhythm’s latest security solutions…

The Business Times logo

EDBI invests in US cybersecurity firm LogRhythm

August 31, 2016

EDBI, the investment arm of the Singapore Economic Development Board (EDB), has taken part in a US$50 million funding round into LogRhythm, a Colorado-based security intelligence and analytics firm…

Reuters logo

Cyber security firm LogRhythm raises $50 million after changing IPO plans

August 30, 2016

Cyber security company LogRhythm has raised $50 million from private investors after postponing plans for an initial public offering late last year, the company said on Tuesday, the latest sign of how austere the IPO market has become for some technology start-ups…

Denver Post logo

LogRhythm’s user-friendly approach to cybersecurity attracts $50 million

August 30, 2016

Fast-growing LogRhythm is expected to announce Tuesday that it raised another $50 million from investors to speed up its global expansion to help large companies fight
cyber attacks…

CSO logo

Why the death of SIEM has been greatly exaggerated

August 29, 2016

SIEM is not only alive and well, it’s also being put to work by small and mid-sized firms in increasing numbers. They are seeing value in the ability to proactively monitor their growing IT infrastructures and spot threats before they can cause disruption…

TechCrunch logo

How data science fights modern insider threats

August 25, 2016

Insider threats are the biggest cybersecurity threats to firms, organizations and government agencies. This is something you hear a lot at security conference keynotes and read about in data breach reports…

Network World logo

New products of the week 8.8.16

August 8, 2016

LogRhythm’s Network Monitor Freemium is featured by Network World as an intriguing new product…

Silicon Valley Watcher logo

Cybersecurity Costs - An Unsustainable Tax On Business

August 4, 2016

The cost of cybersecurity has become a burdensome tax on business and with 1.5 million IT security jobs unfilled, US corporations are losing to sophisticated criminal gangs, said security experts at a recent event in San Francisco….

Fox News logo

Wikileaks DNC email dump sparks
malware fears

July 29, 2016

The trove of leaked Democratic National Committee emails posted to Wikileaks on July 22 has sparked concerns about malware as users access the vast trove of documents. WikiLeaks posted close to 20,000 emails and 8,000 attachments…

ZDNet logo

Cybersecurity is becoming an unsustainable tax on business

July 28, 2016

The annual costs of cybersecurity are doubling for some firms as huge data breaches force them to hire specialists and buy more software…

CIO logo

​Doing business with Simon Howe of LogRhythm: Know thyself, empower your team

July 27, 2016

We’re focused on protecting against today’s rapidly evolving threat landscape which requires broad and deep visibility across the IT environment. LogRhythm provides profound visibility into threats and risks to which organisations are otherwise blind. Designed to help prevent breaches
before they happen…

CNBC logo

2016 GOP platform endorsing strike-back against hackers

July 27, 2016

While the notion of hoisting cybercriminals upon their own petard is undeniably appealing, experts in the fields of security and technology told CNBC that “hacking back” is little more than a pipe dream…

Computer Business Review logo

Five steps to defend against a
ransomware attack

July 11, 2016

Understanding what happens at each phase of a ransomware attack, and knowing the indicators of compromise [IOCs] to look for, increases the likelihood of being able to successfully defend against—or at least mitigate the effects of—an attack…

DNA logo

LogRhythm opens regional Hq in Singapore to build on momentum

July 6, 2016

Security intelligence and analytics company LogRhythm has announced the opening of its new Asia Pacific and Japan (APJ) headquarters in Singapore to support a growing demand for security intelligence solutions. LogRhythm opened its first office in Singapore in 2014 and has since expanded into Sydney, Melbourne, Hong Kong
and Malaysia…

Security Management logo

Patient Zero

July 1, 2016

Ransomware had compromised the $5 billion health-care provider that operates 10 hospitals and more than 250 outpatient facilities in the Washington, D.C., region, serving thousands of patients and employing more than 30,000. While exact details were not released before Security Management’s press time, attackers hit MedStar on the morning of March 28, launching an attack that prevented certain users from logging in to its systems…

IT Pro Portal logo

Mitigating the insider threat to your business

June 25, 2016

This year, we have seen a steady flow of high profile data breaches hitting the headlines. Whether the result of unknown web vulnerabilities, DDOS attacks or overall lax corporate data security policies, data breaches are becoming an everyday occurrence. In fact, it is generally agreed that no organisation is safe and that hackers will get in – but they can be stopped before they cause damage…

Reseller Middle East logo

eHDF, Netcure and LogRhythm launch Cyber Defense Centre

June 22, 2016

eHosting DataFort (eHDF) has announced the launch a Cyber Defense Centre (CDC) based in the UAE. The Cyber Defense Centre will offer customers a portfolio of Managed Security Services (MSS) along with Remote Managed SIEM Services. The announcement was made at a seminar hosted along with Netcure and LogRhythm at Burj Al Arab, Dubai…

CSO logo

Next-generation SIEM turns low-level security monitoring for high-level business goals

June 16, 2016

Despite an initial rush to adopt security and information event management (SIEM) tools, complex implementations and a lack of skilled staff left many companies struggling to use SIEM effectively. That’s all set to change, however, as a new generation of SIEM tools…

CSO logo

Ransomware explosion is the latest security wakeup call for CxOs

June 16, 2016

The massive data breach of US retailer Target was a wakeup call for senior business executives too often disengaged with cybersecurity issues, but surging ransomware attacks are honing CxOs’ attention on the need for automated analytics tools to detect security breaches as they happen – rather than months later, or not at all…

Straits Times logo

‘Not uncommon’ to limit Internet access,
say experts

June 11, 2016

Pulling the plug on Internet access on work computers is not uncommon in the private sector, say cyber-security experts and industry players, particularly in areas that deal with extra-sensitive information. These include the defence, financial and healthcare industries, but to varying degrees depending on the nature of the work employees do…

Channel News Asia logo

No Internet access for public officers’ work computers by next June

June 8, 2016

To guard against cyberattacks over the Internet and create a “more secure working environment”, the work computers of public officers will have no access to the Internet from next June. Channel NewsAsia speaks to Bill Taylor-Mountford who shares insights…

Bloomberg TV Malaysia logo

Malaysian Banks Not Immune to Cyber Threats

June 8, 2016

Cyber crimes cost the world up to half a trillion dollars a year and Malaysian banks are as much at risk as its global peers, says Bill Taylor-Mountford from security intelligence firm LogRhythm. He speaks to Bloomberg TV Malaysia’s Han Tan and shares how organisations in Malaysia can go beyond regulations and compliance to defend themselves against cyber threats…

Forbes logo

Cybersecurity Startups Set For Surge

June 7, 2016

Venture capital investment in cyberphysical security startups rose 78% to $228 million in 2015, and will rise to S400 million in 2016 as rapid adoption of the Internet of Things (IoT) raises the threat to products such as connected cars, smart homes and future factories, according
to Lux Research…

Security Brief AU logo

Exclusive: New strategies to combat cyber attacks, from LogRhythm

May 31, 2016

Some SMEs are are paying lip service to cyber security, opening themselves up to being just another statistic in the malicious cyber crime game. That’s according to Bill Smith, LogRhythm Senior Vice President of Worldwide Field Operations and Bill Taylor, LogRhythm Vice President of Asia Pacific and Japan…

Built in Colorado logo

Before they were CEOs: what 4 Colorado tech leaders studied in college

May 24, 2016

We were curious how Colorado tech leaders got their start — from their childhood hopes to where they went to college — and it turns out, these four brought some pretty interesting lessons with them on their way to the top…

American Security Today logo

Detect Ransomware, Spear Phishing, APTs & Tier-1 Threats Faster

May 22, 2016

LogRhythm has released Network Monitor 3. This latest version of the industry’s leading network monitoring, analytics and forensics solution empowers organizations to detect, investigate and neutralize today’s most advanced and concerning threats…

SC Magazine logo

SC Magazine Reviewed LogRhythm Against 5 Other SIEM Solutions

May 2, 2016

SC Magazine tested six solutions in their 2016 SIEM and UTM Review. Their review emphasized that LogRhythm’s Security Intelligence Platform is a “heavy-duty tool made for a demanding large environment. It is scalable and complete with the largest list of support connectors we’ve seen yet…

ITProPortal logo

GDPR gains EU approval: Industry reaction
and analysis

April 15, 2016

Yesterday it was announced that the European Parliament officially approved the new Global Data Protection Regulations (GDPR), unifying Europe’s multiple data protection regulations into one common law…

The Register logo

Europe’s new privacy safeguards are finally approved, must invade EU nations by 2018

April 14, 2016

The final seal of approval follows successful passage through the EU Parliament’s Committee on Civil Liberties, Justice and Home Affairs. Following four years of discussions and amendments, the GDPR is now officially EU law and will directly apply in all EU countries, replacing ageing EU and national data protection legislation…

Tech Week logo

European Parliament Approves GDPR Data Protection Law

April 14, 2016

The European Parliament has officially approved the General Data Protection Regulation (GDPR) in Strasbourg, after more than four years of negotiations. The GDPR has been in the planning since January 2012, and it aims to give citizens back control over their data in the digital age, including the right to be forgotten. It also…

SC Magazine logo

European Parliament approves GDPR

April 14, 2016

After four years of work the much vaunted GDPR has been approved by the European Parliament, aiming to usher in a new age of data protection for European citizens and the companies that serve them…

eGov Innovation logo

CIO conversations II: A cyber cold war and two crucial steps towards national defence

April 7, 2016

Robert F Lentz continues: the reality of a cyber cold war, cyber-physical implications of the Internet of Things, baking security into systems at the earliest stages, and advice for developing economies when it comes to cyber-defense, including sharing how LogRhythm’s advanced data analytics engine is going to revolutionize the field and why it’s all about speed of detection and speed of response…

eGov Innovation logo

CIO conversations I: Cybersecurity lessons from the US military

April 7, 2016

Understanding security intelligence has never been more critical as disruptive technologies have not only changed the way companies operate and strategize, but have given rise to more sophisticated threats to the security of enterprise networks and data…

Tech Republic logo

LogRhythm mashes up security and big data to give SMBs better defense in one tool

April 6, 2016

Security Intelligence Management (SIM) can even the playing field between IT and cybersecurity attackers. Here’s how one of the leaders in the space offers a real-time battle strategy….

Healthcare Info Security logo

Ransomware: Time for a HIPAA Update?

March 29, 2016

The recent surge in ransomware attacks on hospitals has at least one member of Congress contemplating whether HIPAA’s breach notification requirements need to be clarified or updated to reflect the trend…

Healthcare Info Security logo

MedStar Shuts Systems After Cyberattack

March 29, 2016

A March 28 cyberattack that may have involved ransomware forced MedStar Health, a 10-hospital system serving Maryland and the Washington, D.C. area, to shut down many of its systems to avoid the spread of the malware…

IT Wire logo

Harnessing your inner SIEM

March 21, 2016

The buzzword in 2015 was cyber threat intelligence (CTI) - everyone wanted useful data and analytical tools for next-gen cyber security to detect and respond to threats faster. The industry responded by providing a plethora of CTI products. Matt Willems, a four-year Labs Engineer at LogRhythm, has written a good overview of CTI and SIEM…

Biz West logo

LogRhythm expanding Boulder presence to accommodate growth

March 16, 2016

Fast-growing cybersecurity firm LogRhythm Inc. is adding more real estate in Boulder, with another 50 employees expected to come onboard locally this year…

logo

Former worker stole secret market data, Ofcom admits

March 11, 2016

The media regulator Ofcom has been forced to tell broadcasters that one of its former employees stole a considerable amount of confidential market information from its database and passed it on to his new employer…

City A.M. logo

An ex-Ofcom employee stole commercially sensitive data about the UK’s major TV broadcasters – and then offered it to
one of them

March 10, 2016

Ofcom has admitted that a former employee stole data from the regulator exposing commercially sensitive information about the UK’s biggest TV companies…

Help Net Security logo

UK businesses fail at security awareness

March 7, 2016

UK organizations are putting their reputation, customer trust and competitive advantage at greater risk by failing to provide their staff with effective security awareness and capability to defend against cyber attacks…

CNET

Not in my house: Amazon’s unencrypted devices a sitting target, cybersecurity
experts say

March 4, 2016

The news landed like a record scratch Thursday, when security industry heavyweights gathered at the RSA conference in San Francisco heard Amazon plans to stop protecting the data customers store on its tablets and other devices with a technology called encryption…

SC Magazine logo

Only 28% of cyber-attacks are reported
by UK biz

March 4, 2016

Research from the Institute of Directors (IoD) and Barclays says that only 43 percent of the nearly 1,000 IoD members polled know where their data is physically stored. The research said, “This is a truly frightening statistic. It effectively means businesses are losing control of their organisation’s data which may well be the biggest asset of a business.” One fourth of the respondents…

ExecutiveBiz

Lockheed Martin adds LogRhythm to cybersecurity alliance

March 1, 2016

Lockheed Martin will work with LogRhythm on cybersecurity systems integration pilot programs after the latter signed up for the Lockheed Martin Cyber Security Alliance…

Lockheed Martin

LogRhythm joins Lockheed Martin cybersecurity alliance

February 29, 2016

Lockheed Martin (NYSE: LMT) announced the addition of LogRhythm, a leader in security intelligence and analytics, to the Lockheed Martin Cyber Security Alliance. Alliance members collaborate to solve growing cybersecurity needs and meet future threats through customer-focused solution design, experiments, and end-to-end systems integration pilots…

AP

Los Angeles hospital attack concerns cybersecurity experts

February 18, 2016

Cybersecurity experts worry that the $17,000 a Los Angeles hospital paid hackers to regain control of its computers could signal a troubling escalation of the growing “ransomware” threat…

DNA logo

Critical infrastructure: A clear and
present danger

February 17, 2016

Critical infrastructure like power grids and water supplies has been the target of many theoretical cyber-attacks by academics and white hat hackers for years now, but with the recent shutdown of a power plant in Ukraine by hackers, this threat has now crossed from white-paper territory and into the real world…

ITProPortal logo

Massive web vulnerability puts devices at risk

February 17, 2016

A catastrophic flaw in one of the Internet’s core building blocks may bring a huge amount of apps and hardware devices vulnerable to attacks, according to researchers. A function performing domain-name lookups called getaddrinfo(), contains a buffer overflow bug that allows attackers to remotely execute malicious code. It can be exploited…

Computerworld Singapore logo

Cybersecurity in Asia: Keep your castle safe

January 25, 2016

When it comes to a cyber-attack, it is no longer a question of if your company will be hacked but when. Companies from 2 to 10,000 will get hacked. There’s no question. If you think that’s bad news, then consider this…

Biospectrum logo

Cybersecurity challenge for digitally
connected healthcare

January 22, 2016

As technology drives a revolutionary transformation in the healthcare industry buoyed by the latest innovations in cloud computing, analytics, Internet of Things and other disruptive tech trends, healthcare service providers, including insurers, are rapidly becoming targets of cybercriminals. In fact, the cost of healthcare data breaches could reach $5.6 billion in 2015 according to Experian’s forecast…

WashingtonExec

NIAP Common Criteria Certification Awarded to LogRhythm’s v6.3.4 SIEM Platform

January 20, 2016

It was announced on January 12th by security intelligence company, LogRhythm that it has been granted the National Information Assurance Partnership (NIAP) Common Criteria Certification for its v6.3.4 SIEM platform…

TechBeacon

Takeaways from the latest Gartner Magic Quadrant for SIEM

January 20, 2016

With data breaches making news daily, organizations are looking for effective ways to protect their digital resources…

CSO

Which certifications matter most for those new to security

January 13, 2016

Certifications do matter, but an extensive list of certs with no hands-on learning to show that you can apply and utilize that knowledge won’t bode well in many interviews…

Network World

The Incident Response fab five

January 11, 2016

CISOs should consider and coordinate incident detection and response in five areas: hosts, networks, threat intelligence, user behavior monitoring, and process automation…

Electronic Health Reporter

Healthcare IT predictions for 2016

January 8, 2016

Guest post by James Carder, CISO of LogRhythm, VP of LogRhythm Labs…