In the News

In the News

Why the death of SIEM has been greatly exaggerated

SIEM is not only alive and well, it’s also being put to work by small and mid-sized firms in increasing numbers. They are seeing value in the ability to proactively monitor their growing IT infrastructures and spot threats before they…

Read More

How data science fights modern insider threats

Insider threats are the biggest cybersecurity threats to firms, organizations and government agencies. This is something you hear a lot at security conference keynotes and read about in data breach reports…

Read More

New products of the week 8.8.16

LogRhythm’s NetMon Freemium is featured by Network World as an intriguing new product…

Read More

Cybersecurity Costs – An Unsustainable Tax On Business

The cost of cybersecurity has become a burdensome tax on business and with 1.5 million IT security jobs unfilled, US corporations are losing to sophisticated criminal gangs, said security experts at a recent event in San Francisco…

Read More

Wikileaks DNC email dump sparks malware fears

The trove of leaked Democratic National Committee emails posted to Wikileaks on July 22 has sparked concerns about malware as users access the vast trove of documents. WikiLeaks posted close to 20,000 emails and 8,000 attachments…

Read More

Cybersecurity is becoming an unsustainable tax on business

The annual costs of cybersecurity are doubling for some firms as huge data breaches force them to hire specialists and buy more software…

Read More

Doing business with Simon Howe of LogRhythm: Know thyself, empower your team

We’re focused on protecting against today’s rapidly evolving threat landscape which requires broad and deep visibility across the IT environment. LogRhythm provides profound visibility into threats and risks to which organisations are otherwise blind. Designed to help prevent breaches before…

Read More

2016 GOP platform endorsing strike-back against hackers

While the notion of hoisting cybercriminals upon their own petard is undeniably appealing, experts in the fields of security and technology told CNBC that “hacking back” is little more than a pipe dream…

Read More

Five steps to defend against a ransomware attack

Understanding what happens at each phase of a ransomware attack, and knowing the indicators of compromise [IOCs] to look for, increases the likelihood of being able to successfully defend against—or at least mitigate the effects of—an attack…

Read More

LogRhythm opens regional Hq in Singapore to build on momentum

Security intelligence and analytics company LogRhythm has announced the opening of its new Asia Pacific and Japan (APJ) headquarters in Singapore to support a growing demand for security intelligence solutions. LogRhythm opened its first office in Singapore in 2014 and…

Read More

Patient Zero

Ransomware had compromised the $5 billion health-care provider that operates 10 hospitals and more than 250 outpatient facilities in the Washington, D.C., region, serving thousands of patients and employing more than 30,000. While exact details were not released before Security…

Read More

Mitigating the insider threat to your business

This year, we have seen a steady flow of high profile data breaches hitting the headlines. Whether the result of unknown web vulnerabilities, DDOS attacks or overall lax corporate data security policies, data breaches are becoming an everyday occurrence. In…

Read More