emea

Webinar title Résistez aux cyberattaques à double extorsion. Contrez le ransomware Lilith.

Résistez aux cyberattaques à double extorsion. Contrez le ransomware Lilith.

Les ransomwares sont l’une des formes de cyberattaques les plus dangereuses et les plus fréquentes auxquelles sont confrontées les entreprises modernes. Ils constituent un défi de sécurité en constante évolution. Au cours du premier semestre 2022, Statista* a comptabilisé un…

Webinar title Abwehr von Double-Extortion-Angriffen: So entschärfen Sie die Ransomware Lilith

Abwehr von Double-Extortion-Angriffen: So entschärfen Sie die Ransomware Lilith

Ransomware ist eine der schädlichsten und häufigsten Formen von Cyberangriffen, mit denen moderne Unternehmen konfrontiert sind. Die Angriffe entwickeln sich ständig weiter, was immer neue Sicherheitsprobleme schafft. In der ersten Hälfte des Jahres 2022 fanden laut Statista* weltweit insgesamt 236,1…

it-sa Expo & Congress 2022

Andrew Hollister, CISO

Zero Trust is Emerging as a Leading Security Strategy

Whilst the concepts of Zero Trust were articulated more than a decade ago, with rapid shift to remote working, digital transformation and demand for Cloud services, Zero Trust is finally gaining the attention it deserves and emerging as a leading…

Kev Eley, VP of Sales, Europe

Detecting and Responding to Threats Fast

Detecting and Responding to Threats Fast: Building a SOC with Limited Resources Over the last 18 months, the need for greater cybersecurity across the globe has risen due to a significant shift to remote working and more vulnerable security infrastructure…

The Evolution of NDR on demand image

The Evolution of NDR: Defending and Protecting Critical Data and Infrastructure

Mike Dalgleish

Partner Training Makes All the Difference

Partner Training Makes All the Difference “While initiating and building training programs mostly lies with the vendors, this doesn’t absolve partners or distributors of responsibility in ensuring their employees are up-to-date with new technological improvements and training,” says Michael Dalgleish,…

Kev Eley, VP of Sales, Europe

How to Build a Targeted and Sustainable Cybersecurity Budget

How Much is Enough? How to Build a Targeted and Sustainable Cybersecurity Budget Ensuring cybersecurity investments align with the business’ goals is a key element of success, however, managing the two simultaneously can be extremely challenging. Kev Eley, Vice President…

Security IT Summit

Security IT Summit

Join LogRhythm at the upcoming Security IT Summit! Taking place at the Hilton, London Canary Wharf, and virtually, the Security IT Summit continues to follow the award-winning structure that brings key IT security professionals together with leading solution providers for…

Caisec 2022

Join LogRhythm at <caisec=/22> (Caisec 2022)! Governments and organizations are having to continuously adapt their capabilities to deal with and prevent malicious threat actors from taking advantage of digital transformation. Therefore, cybersecurity needs to be a priority for businesses worldwide.…

Mazen Dohaji headshot

The Need for Predictive Tools is Greater than Ever

The Need for Predictive Tools is Greater than Ever Cybersecurity is undergoing massive shifts in technology and ML can play a vital role in this by capturing insights through its predictive capabilities. Predictive analytics brings a new level of visibility…

Jonathan Zulberg

Staying Ahead of Evolving Cyber Threats

Staying Ahead of Evolving Cyber Threats “Organizations that combine comprehensive visibility, continuous monitoring, advanced analytics, and efficient incident response orchestration are well-positioned to identify and respond to the early indicators of an intruder and rapidly neutralize the threat,” Jonathan Zulberg,…