Blog

LogRhythm Blog

Check out the latest security tips and tricks, news, and insights and join in the conversation
Empty office

Code42 and LogRhythm Partner to Protect Against Insider Threats

As remote work has become the norm for many enterprises, organizations are struggling with the troubling reality of rising insider threats. Whether the results are from careless or negligent employees or malicious insiders, it’s crucial to arm your organization with…

Read More
Telecommunications cellular antenna

Telecommunication Security Use Cases

Attacks made against telcos and internet service providers (ISPs) have steadily risen. Distributed denial of service (DDoS) attackers launched an 11-day attack against a Chinese telco in 2017 — breaking the DDoS record that year. That same year, Kaspersky Lab…

Read More
Wind turbine manufacturing facility.

What is ICS Security? How to Defend Against Attacks

Industrial control systems (ICS) play a fundamental role in monitoring complex industrial processes and infrastructure. Proper ICS security is critical, as these systems often face malicious threats and cyberattacks. The National Institute of Standards and Technology (NIST) explains the importance…

Read More

See what we've been working on...

See how we're delivering on promises to better serve our customers