webinar

The SOC Analyst Experience: Tools and Techniques to Enhance Performance

Security operations center (SOC) analysts are on the frontline of defending against adversaries who are constantly trying to hack sensitive data and information that could lead to a damaging breach. The success of your security team is critical to properly…

May Tips & Tricks: Understanding Your Customer Success Resources

At LogRhythm, our mission is to arm our customers with the latest tools, technology, and resources needed to prioritize, protect, and quickly secure your environment. Each month, we share new and relevant resources to help improve your security posture and…

The SOC Analyst Experience: Tools and Techniques to Enhance Performance

The success of your cybersecurity analysts is critical to properly protect your business.

Security analysts must fight attackers and identify new tools and techniques to help them detect and respond to threats within their environment.

In this webinar, join LogRhythm Senior Threat Research Engineer, Sally Vincent, and our special guest, Forrester Senior Analyst Allie Mellen as they depict the everyday life of a security analyst to understand common pain points and challenges they face and what to do to mitigate analyst burnout.

La chasse aux cybermenaces simplifiée

La chasse aux cybermenaces simplifiée: défendre avec une sécurité cloud-native

Pour bénéficier d’une visibilité totale sur vos données et détecter rapidement les menaces, vous avez besoin d’une solution de gestion des logs robuste, capable de générer des éclairages exploitables à partir d’analyses de logs. Cependant, les équipes de sécurité sont…

Why Zero Trust Security Matters Now

We’ve heard about Zero Trust for years, yet the strategy has been slow to gain traction. Thanks to the growing adoption of cloud services and the enormous changes in working patterns, including hybrid and remote work, Zero Trust is gaining…

In the News [Part 6 Webinar]

In the News [Part 6]

Want to hear about the biggest security headlines directly from industry leaders? “In the News” is a webinar series that provides expert advice on navigating and understanding the ever-changing threat landscape. Keep up to date with the latest and most…

In the News [Part 5] Webinar

In the News [Part 5]

Join Jake Haldeman and Mike V. on this on-demand webinar to keep up with the latest cybersecurity headlines and what you can do to defend against these perils with LogRhythm!

Entering the Cloud Native Security Era

Entering the Cloud-Native Security Era

Security leaders need to routinely assess security risks and leverage best practices for mitigating risks. Software as a Service (SaaS) is a delivery model for software application in which the provider hosts the application and makes it available to customers…

First Line of Defense: The State of the Security Team

Join LogRhythm CISO Andrew Hollister and LogRhythm deputy CISO Kevin Kirkwood to learn more about the state of the security team and how to maximize your team’s efforts to increase security and productivity.

Are you in the Dark When it Comes to Network Visibility? Detect More with NDR.

Protecting your environment against cyberattacks is a complex challenge for the whole organization. And it’s a challenge that’s here to stay. In a world where compromise is a matter of ‘when’ not ‘if’, analysts can’t afford to leave gaps in…

Tips & Tricks: Leveraging Community

Tips & Tricks: Leveraging Community

At LogRhythm, it is our mission to arm our customers with the latest tools and resources needed to prioritize, protect, and quickly secure your environment. That’s why each month we give you new and relevant resources to help improve your…

Webinar title Résistez aux cyberattaques à double extorsion. Contrez le ransomware Lilith.

Résistez aux cyberattaques à double extorsion. Contrez le ransomware Lilith.

Les ransomwares sont l’une des formes de cyberattaques les plus dangereuses et les plus fréquentes auxquelles sont confrontées les entreprises modernes. Ils constituent un défi de sécurité en constante évolution. Au cours du premier semestre 2022, Statista* a comptabilisé un…

Webinar title Abwehr von Double-Extortion-Angriffen: So entschärfen Sie die Ransomware Lilith

Abwehr von Double-Extortion-Angriffen: So entschärfen Sie die Ransomware Lilith

Ransomware ist eine der schädlichsten und häufigsten Formen von Cyberangriffen, mit denen moderne Unternehmen konfrontiert sind. Die Angriffe entwickeln sich ständig weiter, was immer neue Sicherheitsprobleme schafft. In der ersten Hälfte des Jahres 2022 fanden laut Statista* weltweit insgesamt 236,1…

The Ex(filtrated) Files: How to Reduce Insider Risk to Your Organization

In this webinar, LogRhythm International VP Joanne Wong, explores the origin of the increase in insider attacks, implications these attacks can have on your business, and outlines a holistic plan for organizations to reduce the risk of insider threats.

Deep-Dive Analysis of Multi-Factor Authentication Request Generation Attacks

With so many phishing attacks targeting credentials, more organizations are realizing they need multi-factor authentication (MFA) for users with access to critical data. Watch this live webinar to gain more insight into MFA prompt bombing and mitigation strategies!

In the News Part 4

In the News [Part 4]

Want to hear about the biggest security headlines directly from industry leaders? LogRhythm brings you “In the News,” a new webinar series that provides expert advice on navigating the everchanging threat landscape. Channel Sales Engineers Jake Haldeman & Mike Villavicencio…

Anatomy of a Zero Day: How Follina Tricks Word Into Running Arbitrary Code Even with Macros Disabled and Despite Protected View

Anatomy of a Zero Day: How Follina Tricks Word Into Running Arbitrary Code Even with Macros Disabled and Despite Protected View

Align to Memorandum 21-31 Out-of-The-Box With LogRhythm