emea | Page 2 of 4 | LogRhythm


Enterprise IT World logo

Ten Measures to Strengthen the Security Posture

Ten Measures to Strengthen the Security Posture Cyber threats have increased significantly in the wake of increased connectivity and organizations must adopt comprehensive security measures to defend the business. The world is witnessing an unprecedented rate of data generation—by 2025…

REAL security PR image

LogRhythm Partners with REAL security to Enable Enterprises in the Adriatic Region to Detect and Respond to Cyberthreats

The partnership expands LogRhythm’s footprint into south-east Europe and provides REAL security with world-leading security operations capabilities.  Maribor, Slovenia 19 May 2022 — LogRhythm, the company helping busy and lean security operations teams save the day, has launched a strategic…

The Evolution of NDR webinar

The Evolution of NDR: Defending and Protecting Critical Data and Infrastructure

The Evolution of NDR: Defending and Protecting Critical Data and Infrastructure With cyberattacks, such as ransomware, phishing and malware on the rise, network security has never been more critical. Network detection and response (NDR) offers real-time visibility so that you…

Scalable Automated Network Threat Detection in Action

Scalable, Automated Network Threat Detection in Action

Helpnet Security logo

Training employees to identify a spear phishing attack

Nothing Personal: Training Employees to Identify a Spear Phishing Attack. Phishing attacks began years ago as simple spam, designed to trick recipients into visiting sites and becoming customers. In the meantime, they have morphed into a worldwide criminal industry. In…

The Fast Mode logo

Cybersecurity in the IoT World

Cybersecurity in the IoT World: How Telcos Can Secure Critical Infrastructure Against New Threats Over the last year, threat actors have launched a series of major attacks on critical infrastructure, an industry fast becoming one of the most targeted by…

Scalable, Automated Network Threat Detection in Action

Scalable, Automated Network Threat Detection in Action

Log4Shell Vulnerability

Impact and Insights on Log4Shell Vulnerability

Mohan Raj

Attacks on IoT: The Call to Combat Rising Cyberthreats in the Telco Space

Attacks on IoT: In today’s cyberthreat landscape, threat actors are drawn to organizations that operate within critical infrastructure sectors, including telecommunications (telco), due to the potential to cause significant damage and disturbance to critical processes that benefit ordinary people and…

Security Middle East and Africa

Cloud Security Needs to Become a Higher Priority

Mazen Dohaji, Vice President, iMETA, LogRhythm in conversation with Security Middle East and Africa talks about the evolving cybersecurity landscape and explained that with the cloud adoption gaining momentum, cloud security needs to be priority for the organizations in the region.

AmiViz Roadshow Dubai

AmiViz Roadshow Dubai

Join LogRhythm at the upcoming AmiViz Roadshow in Dubai! Taking place on 25 May at Caesar’s Palace Hotel, Dubai, don’t miss LogRhythm’s Ramy Ahmad, Manager, Enterprise Sales Engineer’s talk: Gain unmatched visibility, protection, and threat detection across your environment

Nordic IT Security

Nordic IT Security 2022

Nordic IT Security cyber security forum has been around for 15 years now, acting as a steering wheel for navigation through Nordic’s “cybersecurity watch-out” scheme, with its notable speakers and partners. The conference provides a platform for seasoned industry professionals…

The Evolution and Life of a CISO

The Evolution and Life of a CISO

SIT Africa Forum 2022

The SIT Africa Forum 2022 is an unmissable event reserved for publishers of cybersecurity each year to invite their African customers and prospects to a pleasant and friendly event to come together and discuss their projects. The program includes 4…

Infosecurity Europe

Infosecurity Europe 2022

Infosecurity Europe is the biggest gathering of the information security community in Europe. Each summer the industry comes together to share innovation, learn from each other, test and benchmark solutions, build relationships and drive new business. As the meeting place…

Continuity Central logo

Machine learning in cyber security: a structured approach

Machine learning (ML) and artificial intelligence (AI) have become frequent buzzwords in the cyber security space. Security teams have an urgent need for more automated methods for detecting threats and malicious user activity and ML offers a better future. LogRhythm…

Advanced Persistent Threat risks: creating a ‘security-first’ environment for healthcare

Advanced Persistent Threat (APT) groups are continuing to leverage unique and sophisticated techniques to compromise healthcare organisations across Europe and the rest of the world. Over the last year, the global pandemic has raised additional interest for APT actors both…

Image of Mazen Dohaji, VP Regional Sales iMETA, LogRhythm

The Aftermath of the Rush to Digitalisation: Securing the Cloud in the Middle East

Over the past two years, an increase in digital transformation has driven the rapid adoption of cloud services across the Middle East. Recent initiatives such as UAE Vision 2021 and the adoption of smart technologies are advancing the cloud landscape…