webinar

Tips & Tricks: Leveraging Community

Tips & Tricks: Leveraging Community

At LogRhythm, it is our mission to arm our customers with the latest tools and resources needed to prioritize, protect, and quickly secure your environment. That’s why each month we give you new and relevant resources to help improve your…

Webinar title Résistez aux cyberattaques à double extorsion. Contrez le ransomware Lilith.

Résistez aux cyberattaques à double extorsion. Contrez le ransomware Lilith.

Les ransomwares sont l’une des formes de cyberattaques les plus dangereuses et les plus fréquentes auxquelles sont confrontées les entreprises modernes. Ils constituent un défi de sécurité en constante évolution. Au cours du premier semestre 2022, Statista* a comptabilisé un…

Webinar title Abwehr von Double-Extortion-Angriffen: So entschärfen Sie die Ransomware Lilith

Abwehr von Double-Extortion-Angriffen: So entschärfen Sie die Ransomware Lilith

Ransomware ist eine der schädlichsten und häufigsten Formen von Cyberangriffen, mit denen moderne Unternehmen konfrontiert sind. Die Angriffe entwickeln sich ständig weiter, was immer neue Sicherheitsprobleme schafft. In der ersten Hälfte des Jahres 2022 fanden laut Statista* weltweit insgesamt 236,1…

The Ex(filtrated) Files: How to Reduce Insider Risk to Your Organization

In this webinar, LogRhythm International VP Joanne Wong, explores the origin of the increase in insider attacks, implications these attacks can have on your business, and outlines a holistic plan for organizations to reduce the risk of insider threats.

Experts’ Take: LogRhythm Cybersecurity Predictions 2023

With organizations embracing remote work and welcoming digitalization, cybersecurity professionals must stay on top of cyberattack trends and prepare for what’s to come to proactively defend their organization. Watch this on-demand webinar to prepare for threats and mitigate risks.

Deep-Dive Analysis of Multi-Factor Authentication Request Generation Attacks

With so many phishing attacks targeting credentials, more organizations are realizing they need multi-factor authentication (MFA) for users with access to critical data. Watch this live webinar to gain more insight into MFA prompt bombing and mitigation strategies!

In the News Part 4

In the News [Part 4]

Want to hear about the biggest security headlines directly from industry leaders? LogRhythm brings you “In the News,” a new webinar series that provides expert advice on navigating the everchanging threat landscape. Channel Sales Engineers Jake Haldeman & Mike Villavicencio…

Anatomy of a Zero Day: How Follina Tricks Word Into Running Arbitrary Code Even with Macros Disabled and Despite Protected View

Anatomy of a Zero Day: How Follina Tricks Word Into Running Arbitrary Code Even with Macros Disabled and Despite Protected View

Align to Memorandum 21-31 Out-of-The-Box With LogRhythm

The Great Exfiltration: Employees Leave and Take the Keys

The Great Exfiltration: Employees Leave and Take the Keys

According to the 2022 Ponemon Institute Cost of Insider Threats: Global Report, insider threat incidents have risen 44% over the past two years, with costs per incident up more than a third to $15.38 million. Among the reasons for this…

In the News Part 4

In the News [Part 4]

In the News Part 3

In the News [Part 3]

Want to hear about the biggest security headlines directly from industry leaders? LogRhythm is excited to bring you “In the News,” a new webinar series that provides expert advice on navigating the everchanging threat landscape. Channel Sales Engineers Jake Haldeman…