2022 | Page 2 of 2 | LogRhythm

2022

Exploring the 3 Major Threat Detection Methods

Exploring the 3 Major Threat Detection Methods: Signature, Behavior, Machine Learning

Enhance your Detection and Response with LogRhythm MistNet NDR

Enhance your Detection and Response with LogRhythm MistNet NDR | Webinar

Securing your network against advanced persistent threats (APTs) requires greater visibility to detect and reduce your response time. As threats increase, cloud-based Network Detection and Response (NDR) solutions are more important than ever. In this webinar, Senior Sales Engineer, Brad…

Get to know LogRhythm’s Advanced Analytics UEBA (CloudAI)

Get to know LogRhythm’s Advanced Analytics UEBA (CloudAI) | Webinar

In the News [Part 1]

In the News [Part 1]

Data Security, Digital Transformation & The Great Resignation

Webinar Replay | Data Security, Digital Transformation & The Great Resignation

With more of the workforce calling it quits, the chance of data going with them is increasing. In fact, according to a recent survey from Ponemon Institute, employees are 88 percent more likely today to leak files than they were…

A Look at Cyberwarfare Actions and Detection Using HermeticWiper Malware as the Example

A Look at Cyberwarfare Actions and Detection Using HermeticWiper Malware as the Example

Months before Russia’s invasion of Ukraine, security analysts spotted several variants of “wiper” malware/ransomware targeting Ukrainian government agencies and organizations, with HermeticWiper being one of the most prominent. Seen as an act of preemptive cyberwarfare to cripple the country’s ability…

Data Security, Digital Transformation & The Great Resignation

Data Security, Digital Transformation & The Great Resignation

With more of the workforce calling it quits, the chance of data going with them is increasing.