2022

Deep-Dive Analysis of Multi-Factor Authentication Request Generation Attacks

With so many phishing attacks targeting credentials, more organizations are realizing they need multi-factor authentication (MFA) for users with access to critical data. Watch this live webinar to gain more insight into MFA prompt bombing and mitigation strategies!

In the News Part 4

In the News [Part 4]

Want to hear about the biggest security headlines directly from industry leaders? LogRhythm brings you “In the News,” a new webinar series that provides expert advice on navigating the everchanging threat landscape. Channel Sales Engineers Jake Haldeman & Mike Villavicencio…

Anatomy of a Zero Day: How Follina Tricks Word Into Running Arbitrary Code Even with Macros Disabled and Despite Protected View

Anatomy of a Zero Day: How Follina Tricks Word Into Running Arbitrary Code Even with Macros Disabled and Despite Protected View

Align to Memorandum 21-31 Out-of-The-Box With LogRhythm

The Great Exfiltration: Employees Leave and Take the Keys

The Great Exfiltration: Employees Leave and Take the Keys

According to the 2022 Ponemon Institute Cost of Insider Threats: Global Report, insider threat incidents have risen 44% over the past two years, with costs per incident up more than a third to $15.38 million. Among the reasons for this…

In the News Part 4

In the News [Part 4]

In the News Part 3

In the News [Part 3]

Want to hear about the biggest security headlines directly from industry leaders? LogRhythm is excited to bring you “In the News,” a new webinar series that provides expert advice on navigating the everchanging threat landscape. Channel Sales Engineers Jake Haldeman…

The Great Exfiltration: Employees Leave and Take the Keys

The Great Exfiltration: Employees Leave and Take the Keys

Align to Memorandum 21-31 Out-of-The-Box With LogRhythm

Align to Memorandum 21-31 Out-of-The-Box With LogRhythm

OMB 21-31 is top of mind for federal government agencies. The biggest challenge that federal agencies are facing is how can I align to OMB 21-31 with my current SIEM solution. The thought behind this challenge is that it will…

Webinar Replay Exploring the Three Major Threat Detection Methods

Exploring the Three Major Threat Detection Methods

in the news part 3

In the News [Part 3]

In the News Part 2

In the News [Part 2]

Want to hear about the biggest security headlines directly from industry leaders? LogRhythm brings you “In the News,” a new webinar series that provides expert advice on navigating the everchanging threat landscape. Channel Sales Engineers Jake Haldeman & Mike Villavicencio…