Discover Case Management Use Cases and Tips

Three Steps to Translate Threat Reports into Actionable Items Using MITRE ATT&CK®

Threat Hunting Framework: Three Steps to Translate Threat Reports into Actionable Steps

Thanks to Sally Vincent and Dan Kaiser from the LogRhythm Labs team for developing the process and guiding content described in this post. Threat research can be an invaluable asset to security teams when attempting to formulate a proactive stance…

Operational Technology Security with LogRhythm

Detecting Operational Technology Threats with Claroty and LogRhythm

Attacks on operational technology (OT) have been rising in the for the last decade.[1] The rise began with the Stuxnet worm that attacked Programmable Logic Controllers (PLCs) in SCADA systems and has increased sharply in the last few years. Much…