emea

LogRhythm Holds its First UK Cybersecurity Summit to Share Expertise and Insights About Elevating Cybersecurity Efficiency

Register now for the inaugural event to maximize the efficiency of your security operations and combat the ever-growing threat landscape    London, UK, 6 June 2023 — LogRhythm, the company helping security teams stop breaches by turning disconnected data and signals into trustworthy…

Andrew Hollister, CISO

Zero Trust is Emerging as a Leading Security Strategy

Whilst the concepts of Zero Trust were articulated more than a decade ago, with rapid shift to remote working, digital transformation and demand for Cloud services, Zero Trust is finally gaining the attention it deserves and emerging as a leading…

Kev Eley, VP of Sales, Europe

Detecting and Responding to Threats Fast

Detecting and Responding to Threats Fast: Building a SOC with Limited Resources Over the last 18 months, the need for greater cybersecurity across the globe has risen due to a significant shift to remote working and more vulnerable security infrastructure…

The Evolution of NDR on demand image

The Evolution of NDR: Defending and Protecting Critical Data and Infrastructure

Mike Dalgleish

Partner Training Makes All the Difference

Partner Training Makes All the Difference “While initiating and building training programs mostly lies with the vendors, this doesn’t absolve partners or distributors of responsibility in ensuring their employees are up-to-date with new technological improvements and training,” says Michael Dalgleish,…

Kev Eley, VP of Sales, Europe

How to Build a Targeted and Sustainable Cybersecurity Budget

How Much is Enough? How to Build a Targeted and Sustainable Cybersecurity Budget Ensuring cybersecurity investments align with the business’ goals is a key element of success, however, managing the two simultaneously can be extremely challenging. Kev Eley, Vice President…

Mazen Dohaji headshot

The Need for Predictive Tools is Greater than Ever

The Need for Predictive Tools is Greater than Ever Cybersecurity is undergoing massive shifts in technology and ML can play a vital role in this by capturing insights through its predictive capabilities. Predictive analytics brings a new level of visibility…

Jonathan Zulberg

Staying Ahead of Evolving Cyber Threats

Staying Ahead of Evolving Cyber Threats “Organizations that combine comprehensive visibility, continuous monitoring, advanced analytics, and efficient incident response orchestration are well-positioned to identify and respond to the early indicators of an intruder and rapidly neutralize the threat,” Jonathan Zulberg,…

Enterprise IT World logo

Ten Measures to Strengthen the Security Posture

Ten Measures to Strengthen the Security Posture Cyber threats have increased significantly in the wake of increased connectivity and organizations must adopt comprehensive security measures to defend the business. The world is witnessing an unprecedented rate of data generation—by 2025…

REAL security PR image

LogRhythm Partners with REAL security to Enable Enterprises in the Adriatic Region to Detect and Respond to Cyberthreats

The partnership expands LogRhythm’s footprint into south-east Europe and provides REAL security with world-leading security operations capabilities.  Maribor, Slovenia 19 May 2022 — LogRhythm, the company helping busy and lean security operations teams save the day, has launched a strategic…

Scalable Automated Network Threat Detection in Action

Scalable, Automated Network Threat Detection in Action

Helpnet Security logo

Training employees to identify a spear phishing attack

Nothing Personal: Training Employees to Identify a Spear Phishing Attack. Phishing attacks began years ago as simple spam, designed to trick recipients into visiting sites and becoming customers. In the meantime, they have morphed into a worldwide criminal industry. In…

The Fast Mode logo

Cybersecurity in the IoT World

Cybersecurity in the IoT World: How Telcos Can Secure Critical Infrastructure Against New Threats Over the last year, threat actors have launched a series of major attacks on critical infrastructure, an industry fast becoming one of the most targeted by…

Log4Shell Vulnerability

Impact and Insights on Log4Shell Vulnerability

Mohan Raj

Attacks on IoT: The Call to Combat Rising Cyberthreats in the Telco Space

Attacks on IoT: In today’s cyberthreat landscape, threat actors are drawn to organizations that operate within critical infrastructure sectors, including telecommunications (telco), due to the potential to cause significant damage and disturbance to critical processes that benefit ordinary people and…

Security Middle East and Africa

Cloud Security Needs to Become a Higher Priority

Mazen Dohaji, Vice President, iMETA, LogRhythm in conversation with Security Middle East and Africa talks about the evolving cybersecurity landscape and explained that with the cloud adoption gaining momentum, cloud security needs to be priority for the organizations in the region.

The Evolution and Life of a CISO

The Evolution and Life of a CISO

Continuity Central logo

Machine learning in cyber security: a structured approach

Machine learning (ML) and artificial intelligence (AI) have become frequent buzzwords in the cyber security space. Security teams have an urgent need for more automated methods for detecting threats and malicious user activity and ML offers a better future. LogRhythm…