Blog - page 2

Optimize Platform Performance with Case Management

LogRhythm’s built-in Case Management provides end-to-end Threat Lifecycle Management (TLM), but in order to maximize efficiency and provide key performance indicators (KPIs), a case tagging schema needs to be chosen and implemented.

Read More

IT Security in an OT World

Operational Technology (OT) is the latest umbrella term to encompass functionalities such as industrial control systems (ICS), Supervisory Control and Data Acquisition (SCADA) systems, programmable logic controllers (PLCs), and building automation.

Read More

Security Perspective: The CISO of Colorado

As the Chief Information Security Officer (CISO) for the state of Colorado, Debbi Blyth is responsible for protecting Colorado residents’ information. This information is spread across 17 different agencies and is highly sensitive.

Read More

Women in Security: Nancy Reynolds

Nancy Reynolds, vice president, Americas channel sales at LogRhythm, develops and executes sales strategy while innovating investment plans and comprehensive metrics. See how Reynolds is pioneering cybersecurity sales at LogRhythm in this video.

Read More

Security Advisory: Meltdown and Spectre Vulnerabilities

Between January 3 and 4, 2018, three vulnerabilities, named Spectre and Meltdown, in processor hardware were made public that affect nearly all modern architectures.This blog is a security advisory outlining key points, available patches, and recommendations.

Read More

7 Common CISO Pain Points and How to Overcome Them

Working in cybersecurity has its clear benefits: bringing value to a vital industry, competitive pay, an open job market. With any job, however, there will always be some aspects that are less exciting than others.

Read More