Blog - page 3

Dynamic Data Exchange (DDE): Detection and Response, Part 1

Malicious actors have begun using Microsoft’s Dynamic Data Exchange (DDE) mechanism to deliver payloads via Microsoft Office documents instead of the traditional embedded macros or VBA code. Using LogRhythm’s integration with Carbon Black, security operations center (SOC) analysts can efficiently detect, mitigate, and remediate a Microsoft DDE-based attack.

Read More

Optimize Platform Performance with Case Management

LogRhythm’s built-in Case Management provides end-to-end Threat Lifecycle Management (TLM), but in order to maximize efficiency and provide key performance indicators (KPIs), a case tagging schema needs to be chosen and implemented.

Read More

IT Security in an OT World

Operational Technology (OT) is the latest umbrella term to encompass functionalities such as industrial control systems (ICS), Supervisory Control and Data Acquisition (SCADA) systems, programmable logic controllers (PLCs), and building automation.

Read More

Security Perspective: The CISO of Colorado

As the Chief Information Security Officer (CISO) for the state of Colorado, Debbi Blyth is responsible for protecting Colorado residents’ information. This information is spread across 17 different agencies and is highly sensitive.

Read More

Women in Security: Nancy Reynolds

Nancy Reynolds, vice president, Americas channel sales at LogRhythm, develops and executes sales strategy while innovating investment plans and comprehensive metrics. See how Reynolds is pioneering cybersecurity sales at LogRhythm in this video.

Read More