In the News

In the News

Jonathan Zulberg

Staying Ahead of Evolving Cyber Threats

Staying Ahead of Evolving Cyber Threats “Organizations that combine comprehensive visibility, continuous monitoring, advanced analytics, and efficient incident response orchestration are well-positioned to identify and respond to the early indicators of an intruder and rapidly neutralize the threat,” Jonathan Zulberg,…

Read More
Enterprise IT World logo

Ten Measures to Strengthen the Security Posture

Ten Measures to Strengthen the Security Posture Cyber threats have increased significantly in the wake of increased connectivity and organizations must adopt comprehensive security measures to defend the business. The world is witnessing an unprecedented rate of data generation—by 2025…

Read More
Michael Bovalino, Country Manager, ANZ

Priorities in Australia’s IT Sector for the next Government (Part 5)

In this, the fifth instalment in our special series on the state of the IT industry in Australia, we speak with Michael Bovalino, ANZ Country Manager, LogRhythm to get his thoughts on “What our next government needs to do to…

Read More
Michael Bovalino, Country Manager, ANZ

Let’s Talk: Business experts underline key issues ahead of the 2022 elections

Michael Bovalino, ANZ Country Manager, LogRhythm Michael Bovalino, ANZ Country Manager, LogRhythm “Organisations around the world are investing heavily to take advantage of the significant economic and social opportunities that a digital economy can bring. “Australian business ongoing success depends…

Read More
forbes logo

Modern Cyber Threats Require A Modern Security Operations Center: Is Your Business Prepared?

The never-ending barrage of alerts and massive amounts of log data to sift through daily leaves many security teams stretched too thin to identify actual threats promptly. That’s why organizations must prioritize modernizing their security operations center (SOC).

Read More
Helpnet Security logo

Training employees to identify a spear phishing attack

Nothing Personal: Training Employees to Identify a Spear Phishing Attack. Phishing attacks began years ago as simple spam, designed to trick recipients into visiting sites and becoming customers. In the meantime, they have morphed into a worldwide criminal industry. In…

Read More

See what we've been working on...

See how we're delivering on promises to better serve our customers