Blog - page 3

SCADA Network Security Monitoring

With LogRhythm NetMon, you can analyze traffic flow between supervisory control and data acquisition (SCADA) systems, helping prevent major breaches of industrial control grids.

Read More

CloudAI for User and Entity Based Analytics (UEBA)

LogRhythm CloudAI uses machine learning to apply behavioral analytics to user behavior. By modeling user behavior to uncover security relevant anomalous activity, it can detect previously unknown attacks across your security environment.

Read More

Bad Rabbit Ransomware Technical Analysis

On October 24, 2017, a new strain of ransomware dubbed "Bad Rabbit" emerged. This blog provides an in-depth analysis, recommendations for mitigation, IOCs, and LogRhythm AI Engine rules and NetMon queries for detection.

Read More

Journey to the AI-Enabled SOC: Genesis

Nearly 15 years ago, LogRhythm set out to build a security platform that could provide broad forensic visibility and apply advanced analytics models across all data from an environment. Today, we've grown to be a leading innovator in our market, but we are far from done. To further the realization of our platform vision, we have spent the past two years building our next foundational analytics technology—LogRhythm CloudAI.

Read More

Women in Security: Erika Noerenberg

LogRhythm Senior Malware Analyst, Erika Noerenberg, discusses why finding an inclusive and supportive culture is important for women in the security field. Watch this interview to learn more about Noerenberg’s experience as a woman working in cybersecurity.

Read More

Women in Security Interview Series: Sara Avery

Sara Avery, enterprise sales and account manager at LogRhythm, is focused on bringing more women into the cybersecurity industry. Avery is a Co-Founder and Chair Member of Women in Security, Colorado Chapter—an organization within the Information Systems Security Association (ISSA). See how Avery is uniting women in security in this video.

Read More

Announcing the Winners of the Rule Your Network Challenge

Over the summer, LogRhythm hosted our first-ever public Network Monitor Hackathon on DevPost. The “Rule Your Network Challenge” offered large cash prizes for three categories. Here are the winners of the contest and our favorite submissions.

Read More

The Reality of Ransomware

LogRhythm provides seamless interoperability bringing unrivaled visibility into your Cisco security hardware and software portfolio to enhance your security operations.

Read More