Blog

Do More with Security Automation and Orchestration (SAO)

Security automation and orchestration has become a bit of a buzzword in the security space. And it *is* a silver bullet in terms of solving *certain* challenges. SAO helps a SecOps team realize a very quick return on investment by providing technology- and automation-enabled workflows that accelerate threat qualification and investigation capabilities.

Security-Aware Adaptive Networks are Now a Reality

Designing an Adaptive Security Architecture with Unisys Stealth and LogRhythm Detecting internal reconnaissance and lateral movement along the Cyber Attack Lifecycle—also known as the Cyber Kill Chain—can help organizations catch threat actors before they can realize target attainment. However, many SecOps teams face barriers as they work to stop threats and recognize progression from one stage to the next. Gaining early visibility into threats, such as insiders or external actors utilizing compromised credentials, can be impeded or complicated if threats

How to Sell Your Cybersecurity Strategy to the Board: An Interview with James Carder

Today most boards are well aware that cybersecurity is an important issue. But being able to convince them that your cybersecurity strategy is the right one, establish buy-in, and win their budget allocation is not always an easy task. In this interview, James Carder—LogRhythm CISO—shares his experience with executing a successful cybersecurity presentation to the board.

RSA Bound: Thoughts from a First Timer and Industry Newbie, Part 4

In a nutshell, RSA was great. It was wonderful to hear where the industry, our competitors, and cyber criminals are headed. It’s also encouraging to affirm that LogRhythm and our strategic partners are aligned with the industry and our customers from a tactical and strategic perspective.