Blog - page 10

RSA Bound: Thoughts from a First Timer and Industry Newbie, Part 3

Thoughts from a First Timer and Industry Newbie about RSA 2017. It’s the final day of RSA and I’m still standing (just barely). This week has been a whirlwind of activity, full of sessions, keynotes, a hectic show floor, after parties, and networking. After so much going on, I wanted to take a moment to talk about the themes or topics that have resonated with me the most.

Read More

Making Sense of IoT Data

To show you the power of IoT data, I have assembled some data samples and generated a couple common IoT use cases in our LogRhythm Demo Lab. Let’s take a look at a couple of use cases.

Read More

RSA Bound: Thoughts from a First Timer and Industry Newbie, Part 2

Thoughts from a First Timer and Industry Newbie about RSA 2017. So, how did I spend day one? Well, besides wading through a swarm of vendors, food samples, and similar, I spent the entire day immersed in one hour sessions. Yesterday’s overall theme was Security 101, where various sessions covered security topics for those of us with less than 5 years of experience in the industry.

Read More

Passive Discovery and Exploitation of Open SMB Shares

Server Message Block (SMB) shares are a critical component to most organizations—allowing for a central repository of files and other items that people need to access and share to do their jobs. As a security professional, it is critical that you identify these vulnerabilities within your environment and lock them down.

Read More

User Threat Detection—There’s a Module for That

End-user behavior can be difficult to baseline and monitor. Where traditional analytics and perimeter defenses fall short, LogRhythm’s User and Entity Behavior Analytics (UEBA) capabilities add an additional layer of security enabling the rapid detection of dangerous user activity.

Read More