Blog

Journey to the AI-Enabled SOC: Unlocking Potential with Data

Our Machine Data Intelligence (MDI) Fabric uniquely empowers our platform’s end-to-end TLM feature set. Its data characteristics are critically important to developing meaningful behavioral baselines of activity and realizing true threat relevancy of observed behavioral anomalies

Read More

Investing in Our Veterans

LogRhythm is paying thanks to the veteran community by partnering with organizations focused on providing the resources, training, and tools necessary to translate military experience into business leadership.

Read More

SCADA Network Security Monitoring

With LogRhythm NetMon, you can analyze traffic flow between supervisory control and data acquisition (SCADA) systems, helping prevent major breaches of industrial control grids.

Read More

CloudAI for User and Entity Based Analytics (UEBA)

LogRhythm CloudAI uses machine learning to apply behavioral analytics to user behavior. By modeling user behavior to uncover security relevant anomalous activity, it can detect previously unknown attacks across your security environment.

Read More

Bad Rabbit Ransomware Technical Analysis

On October 24, 2017, a new strain of ransomware dubbed "Bad Rabbit" emerged. This blog provides an in-depth analysis, recommendations for mitigation, IOCs, and LogRhythm AI Engine rules and NetMon queries for detection.

Read More

Journey to the AI-Enabled SOC: Genesis

Nearly 15 years ago, LogRhythm set out to build a security platform that could provide broad forensic visibility and apply advanced analytics models across all data from an environment. Today, we've grown to be a leading innovator in our market, but we are far from done. To further the realization of our platform vision, we have spent the past two years building our next foundational analytics technology—LogRhythm CloudAI.

Read More

Women in Security: Erika Noerenberg

LogRhythm Senior Malware Analyst, Erika Noerenberg, discusses why finding an inclusive and supportive culture is important for women in the security field. Watch this interview to learn more about Noerenberg’s experience as a woman working in cybersecurity.

Read More