webinar

In the News Part 4

In the News [Part 4]

Want to hear about the biggest security headlines directly from industry leaders? LogRhythm brings you “In the News,” a new webinar series that provides expert advice on navigating the everchanging threat landscape. Channel Sales Engineers Jake Haldeman & Mike Villavicencio…

The Great Exfiltration: Employees Leave and Take the Keys

The Great Exfiltration: Employees Leave and Take the Keys

According to the 2022 Ponemon Institute Cost of Insider Threats: Global Report, insider threat incidents have risen 44% over the past two years, with costs per incident up more than a third to $15.38 million. Among the reasons for this…

In the News Part 3

In the News [Part 3]

Want to hear about the biggest security headlines directly from industry leaders? LogRhythm is excited to bring you “In the News,” a new webinar series that provides expert advice on navigating the everchanging threat landscape. Channel Sales Engineers Jake Haldeman…

Align to Memorandum 21-31 Out-of-The-Box With LogRhythm

Align to Memorandum 21-31 Out-of-The-Box With LogRhythm

OMB 21-31 is top of mind for federal government agencies. The biggest challenge that federal agencies are facing is how can I align to OMB 21-31 with my current SIEM solution. The thought behind this challenge is that it will…

In the News Part 2

In the News [Part 2]

Want to hear about the biggest security headlines directly from industry leaders? LogRhythm brings you “In the News,” a new webinar series that provides expert advice on navigating the everchanging threat landscape. Channel Sales Engineers Jake Haldeman & Mike Villavicencio…

Enhance your Detection and Response with LogRhythm MistNet NDR

Enhance your Detection and Response with LogRhythm MistNet NDR

Securing your network against advanced persistent threats (APTs) requires greater visibility to detect and reduce your response time. As threats increase, cloud-based Network Detection and Response (NDR) solutions are more important than ever. In this webinar, Senior Sales Engineer, Brad…

Exploring the 3 Major Threat Detection Methods

Exploring the 3 Major Threat Detection Methods: Signature, Behavior, Machine Learning

I kid you not that more than once, it’s been asked, “Which event IDs indicate a security intrusion so I can set up an alert in my SIEM?” If it were only so easy. How do you effectively detect attacker…

Get to know LogRhythm’s Advanced Analytics UEBA | Webinar

In the News

In the News [Part 1]

The Evolution and Life of a CISO

The Evolution and Life of a CISO