Blog

Journey to the AI-Enabled SOC: Genesis

Nearly 15 years ago, LogRhythm set out to build a security platform that could provide broad forensic visibility and apply advanced analytics models across all data from an environment. Today, we've grown to be a leading innovator in our market, but we are far from done. To further the realization of our platform vision, we have spent the past two years building our next foundational analytics technology—LogRhythm CloudAI.

Read More

Women in Security: Erika Noerenberg

LogRhythm Senior Malware Analyst, Erika Noerenberg, discusses why finding an inclusive and supportive culture is important for women in the security field. Watch this interview to learn more about Noerenberg’s experience as a woman working in cybersecurity.

Read More

Women in Security Interview Series: Sara Avery

Sara Avery, enterprise sales and account manager at LogRhythm, is focused on bringing more women into the cybersecurity industry. Avery is a Co-Founder and Chair Member of Women in Security, Colorado Chapter—an organization within the Information Systems Security Association (ISSA). See how Avery is uniting women in security in this video.

Read More

Announcing the Winners of the Rule Your Network Challenge

Over the summer, LogRhythm hosted our first-ever public Network Monitor Hackathon on DevPost. The “Rule Your Network Challenge” offered large cash prizes for three categories. Here are the winners of the contest and our favorite submissions.

Read More

The Reality of Ransomware

LogRhythm provides seamless interoperability bringing unrivaled visibility into your Cisco security hardware and software portfolio to enhance your security operations.

Read More

What is the GDPR and How Can You Prepare?

The General Data Protection Regulation (GDPR) is the world’s first attempt at implementing big data compliance regulation, and it seems to be inspiring some fear throughout the compliance industry. Now that GDPR has come to combat the uptick in cyberattacks, compliance has to evolve.

Read More

7 Steps to Build Your Security Operations Center

Cyberattacks such as WannaCry and Petya/NotPetya are becoming today’s norm. Keeping up with the growing rate of cyberattacks may seem impossible when your business is lacking in security resources and staff. Most organizations report that they cannot afford to staff a 24x7 security operations center (SOC). Building an automated SOC can enable your team to rapidly detect and respond to threats.

Read More

Integrated Endpoint Protection and Response

This powerful integration, combines Carbon Black’s complete endpoint detection and response solution with the advanced analytics and automated response capabilities of LogRhythm.

Read More

Breaking Down the Anatomy of a Phishing Attack

Detecting a spear phishing attack can often be like searching for a needle in haystack. However, your security operation center (SOC) analysts can use LogRhythm’s SmartResponse and AI Engine to rapidly detect and respond to these damaging breaches.

Read More