emea

Les Assises de la Cybersécurité 2023

Les Assises de la Cybersécurité 2023

Join LogRhythm at Les Assises de la Cybersécurité 2023 Monaco, France! Visit our booth and learn how your organization can be protected from advanced cybersecurity threats with LogRhythm security offerings.

Nordic Baltic Security Summit

Nordic Baltic Security Summit

Join LogRhythm at the Nordic Baltic Security Summit in Talinn, Estonia! Visit our booth and learn how your organization can be protected from advanced cybersecurity threats with LogRhythm security offerings.

RISK 2023

RISK 2023

Join LogRhythm at RISK 2023 in Lasko, Slovenia! Visit our booth, play the game and learn how your organization can be protected from advanced cybersecurity threats with LogRhythm security offerings.

Forum Kierowników IT w Administracji

Forum Kierowników IT w Administracji

Join LogRhythm at Forum Kierowników IT w Administracji in Zakopane, Poland! Visit our booth and learn how your organization can be protected from advanced cybersecurity threats with LogRhythm security offerings.

Webinar title Résistez aux cyberattaques à double extorsion. Contrez le ransomware Lilith.

Résistez aux cyberattaques à double extorsion. Contrez le ransomware Lilith.

Les ransomwares sont l’une des formes de cyberattaques les plus dangereuses et les plus fréquentes auxquelles sont confrontées les entreprises modernes. Ils constituent un défi de sécurité en constante évolution. Au cours du premier semestre 2022, Statista* a comptabilisé un…

Webinar title Abwehr von Double-Extortion-Angriffen: So entschärfen Sie die Ransomware Lilith

Abwehr von Double-Extortion-Angriffen: So entschärfen Sie die Ransomware Lilith

Ransomware ist eine der schädlichsten und häufigsten Formen von Cyberangriffen, mit denen moderne Unternehmen konfrontiert sind. Die Angriffe entwickeln sich ständig weiter, was immer neue Sicherheitsprobleme schafft. In der ersten Hälfte des Jahres 2022 fanden laut Statista* weltweit insgesamt 236,1…

it-sa Expo & Congress 2022

Andrew Hollister, CISO

Zero Trust is Emerging as a Leading Security Strategy

Whilst the concepts of Zero Trust were articulated more than a decade ago, with rapid shift to remote working, digital transformation and demand for Cloud services, Zero Trust is finally gaining the attention it deserves and emerging as a leading…

Kev Eley, VP of Sales, Europe

Detecting and Responding to Threats Fast

Detecting and Responding to Threats Fast: Building a SOC with Limited Resources Over the last 18 months, the need for greater cybersecurity across the globe has risen due to a significant shift to remote working and more vulnerable security infrastructure…

The Evolution of NDR on demand image

The Evolution of NDR: Defending and Protecting Critical Data and Infrastructure

Mike Dalgleish

Partner Training Makes All the Difference

Partner Training Makes All the Difference “While initiating and building training programs mostly lies with the vendors, this doesn’t absolve partners or distributors of responsibility in ensuring their employees are up-to-date with new technological improvements and training,” says Michael Dalgleish,…

Kev Eley, VP of Sales, Europe

How to Build a Targeted and Sustainable Cybersecurity Budget

How Much is Enough? How to Build a Targeted and Sustainable Cybersecurity Budget Ensuring cybersecurity investments align with the business’ goals is a key element of success, however, managing the two simultaneously can be extremely challenging. Kev Eley, Vice President…

Security IT Summit

Security IT Summit

Join LogRhythm at the upcoming Security IT Summit! Taking place at the Hilton, London Canary Wharf, and virtually, the Security IT Summit continues to follow the award-winning structure that brings key IT security professionals together with leading solution providers for…

Caisec 2022

Join LogRhythm at <caisec=/22> (Caisec 2022)! Governments and organizations are having to continuously adapt their capabilities to deal with and prevent malicious threat actors from taking advantage of digital transformation. Therefore, cybersecurity needs to be a priority for businesses worldwide.…

Mazen Dohaji headshot

The Need for Predictive Tools is Greater than Ever

The Need for Predictive Tools is Greater than Ever Cybersecurity is undergoing massive shifts in technology and ML can play a vital role in this by capturing insights through its predictive capabilities. Predictive analytics brings a new level of visibility…

Jonathan Zulberg

Staying Ahead of Evolving Cyber Threats

Staying Ahead of Evolving Cyber Threats “Organizations that combine comprehensive visibility, continuous monitoring, advanced analytics, and efficient incident response orchestration are well-positioned to identify and respond to the early indicators of an intruder and rapidly neutralize the threat,” Jonathan Zulberg,…

Enterprise IT World logo

Ten Measures to Strengthen the Security Posture

Ten Measures to Strengthen the Security Posture Cyber threats have increased significantly in the wake of increased connectivity and organizations must adopt comprehensive security measures to defend the business. The world is witnessing an unprecedented rate of data generation—by 2025…

REAL security PR image

LogRhythm Partners with REAL security to Enable Enterprises in the Adriatic Region to Detect and Respond to Cyberthreats

The partnership expands LogRhythm’s footprint into south-east Europe and provides REAL security with world-leading security operations capabilities.  Maribor, Slovenia 19 May 2022 — LogRhythm, the company helping busy and lean security operations teams save the day, has launched a strategic…