In the News

In the News

Do You Have a Security Tools Gap?

Studies show that most CISOs think they have a security tools gap, but a deeper dive into the issue uncovers a much more complex dynamic.

Read More

James Carder, LogRhythm: A Rise in Internet Policing in 2021 as Misinformation Reaches New Heights

This is part of an ongoing 2021 predictions series. We’ve asked top cyber experts to contribute their insights and expertise to provide a look ahead at what the new year may bring to cybersecurity.

Read More
Addressing Stress In Security Operations Teams

14 Cloud Usage Costs That Could Bust Your Tech Budget

“Big data sprawl and a lack of control over data transactions in and out of the cloud are often major budget-busters. The cloud can be quite cost-effective, especially when you are keeping the data in the same cloud. If you are moving large amounts of data from cloud provider to cloud provider, cloud to on-premise, etc., then your costs will be hard to control,” said James Carder, CSO at LogRhythm

Read More
Toolbox Security Logo

Remote Learning Picks Up, So Do Ransomware Attacks: 6 Steps to Manage Risk

As campuses deal with virtual instruction, educational technologists must ensure they’ve considered a ransomware infection as a likely scenario for their incident response and disaster recovery plans. Here’s advice from LogRhythm’s Chief Security Officer James Carder on defending against ransomware…

Read More
Solutions Review Logo

Managed.com Hit by REvil Ransomware Attack, $500 K Demand

“Companies that house thousands of customer sites must implement proper technology to protect customer information. Managed.com believed the attack was unscheduled maintenance at first, leaving more time for malicious actors to cause harm. This attack highlights the importance of ongoing vigilance, a quick response time, and proper IT hygiene in every business, no matter the vertical or industry,” commented Rusty Carter, CPO at LogRhythm.

Read More
AlJammaz Technologies Fortifies Cybersecurity Portfolio with LogRhythm Partnership

AlJammaz Technologies Fortifies Cybersecurity Portfolio with LogRhythm Partnership

AlJammaz Technologies has signed a distribution agreement with LogRhythm, a global player in NextGen SIEM. Through this agreement the two organisations plan to jointly develop, engage, inspire and enable IT channel partners to provide the latest cyber security solutions to customers in the region.

Read More
LogRhythm CIO Expects Short Tech Stack to Deliver Long Results

LogRhythm CIO Expects Short Tech Stack to Deliver Long Results

“Simplify” is the crucial word, and even if Rex Young, CIO at LogRhythm, and his colleagues can’t see the writing on his walls because COVID-19 has them working remotely, simplify is the operative and overriding word guiding the company’s technological growth. Yet, as complex as those cybersecurity needs and programs may be, as CIO, Young’s guiding a deconstruction of LogRhythm’s tech architecture, stripping down how the company works. “If you have streamlined internal systems with efficiencies and have a business growth model, it makes a company more attractive,” he explains.

Read More
How to shop online safely during Singles' Day sales and stay clear of scammers

How to Shop Online Safely During Singles’ Day Sales and Stay Clear of Scammers

Ms. Joanne Wong, VP of International Markets at LogRhythm, and Mr. Stas Protassov, Co-founder and Technology President of Cyber Protection Company Acronis, offer the tips to shop online safely during Singles’ Day sales and stay clear of scammers.

Read More
Forbes

Addressing Stress In Security Operations Teams

Over the past few years, there has been a growing issue of stress, burnout and other mental health problems among security professionals. It has not been well understood how high the level of stress on security operations teams really is. To quote LogRhythm’s Chief Security Officer, “Working in security can feel like you’re sitting on top of a powder keg that could explode at any time.”

Read More
Baltimore County Schools Forced to Cancel Classes Following Ransomware Attack

Marijuana Growing Social Website GrowDiaries Exposes Data of 3.4M Users

Rusty Carter, Chief Product Officer at LogRhythm, noted that GrowDiaries users are now vulnerable to a number of attacks and threats. “This raises the risk of credential stuffing, which occurs when attackers leverage stolen passwords from one website for use across multiple different places since many people tend to reuse their credentials,” he warned.

Read More
Phishing, Sniffing & Zoombombing: Cyber Security During COVID-19

Phishing, Sniffing & Zoombombing: Cyber Security During COVID-19

“Universities provide really rich pickings across quite a wide range of actors,” explained Andrew Hollister, head of LogRhythm Labs. “They’re valuable for three reasons. One is they hold an enormous amount of personal data. Secondly, universities are open by their very nature. And finally, universities are heavily engaged in research. This makes universities a target for both cybercriminals doing extortion, as well as state espionage,” he added.

Read More
Take the pressure down! Four ways to lower the stress levels of your cybersecurity team

LogRhythm’s RhythmWorld Breaks Attendance Records with 300% Increase

LogRhythm opened up the event from what used to be strictly a user conference into a broader event with relevance to the security industry at large. “If you truly want to change things in terms of cybersecurity, you have to be the catalyst for change and have resilience and grit. Security professionals must also hone their leadership skills to effectively inspire their team, as building a cybersecurity strategy requires both internal stakeholders’ endorsement and engagement to shape the strategy that is fit for the organization,” said Abid Adam, Group Chief Risk and Compliance Officer, Axiata Group Berhad.

Read More