Security from simplicity: Why complexity is the enemy of security
Posted by: Nicholas Tan
IT security is complicated. It’s an arms race. Hackers and Chief Information Security Officers (CISOs) are stuck in a never-ending game of whack-a-mole, where vulnerabilities keep popping up that security teams try and fix before they can be exploited by…
Read More
December 7, 2022
ÂHow CISOs can protect their growing infrastructure without blowing the budget
Posted by: Nicholas Tan
The volume of data flowing through corporate networks is increasing at a phenomenal rate and will continue for the foreseeable future. As companies grow, the amount of data they are responsible for protecting also increases. More data requires more infrastructure,…
Read More
November 30, 2022
Introducing Security Spotlights
Gain the Cybersecurity Insights Needed to Reduce Noise, Prioritize Work and Quickly Secure Your Environment. Your cybersecurity needs are constantly changing as cybersecurity threats continue to evolve and increase in complexity. At LogRhythm, we are always looking to make it…
Read More
November 24, 2022
The CISO’s Guide to Choosing the Right SIEM
Posted by: Nicholas Tan
Cybersecurity has evolved into one of the most important departments in any organization. Forty years ago, long before connectivity was ubiquitous, IT security involved ensuring the computer room was locked so criminals couldn’t steal the floppy disks or punch cards.…
Read More
November 22, 2022
Cyberattacks Are the Most Cited Risk to the UK Financial System
Posted by: Richard Edwards
The latest research from The Bank of England has revealed that 74% of financial institutions declared that a cyberattack was amongst the top risks they thought would have the greatest impact on the UK financial system if they were to…
Read More
November 18, 2022
Defending Against Multi-Factor Authentication Fatigue Attacks
Posted by: Sally Vincent
Implementing a multi-factor authentication (MFA) solution in your organization adds significant protection against user account compromise, but by no means is MFA hacker-proof. There are many tactics cybercriminals use to defeat MFA security, such as SIM swapping, transparent proxies, and…
Read More
November 8, 2022