Blog

LogRhythm Blog

Check out the latest security tips and tricks, news, and insights and join in the conversation
Shaking Hands

How to Build and Retain a Strong Security Operations Team

A security operations center (SOC) is like a machine. But like a machine, when one component is not working, performance can come to a standstill. Among the various elements — people, process, and technology — required to run an effective security operation, people…

Read More
Map

How to Build Security Use Cases for Your SIEM

If you’re anything like me, you create an itinerary when traveling to a new place for an extended period. You want to prepare for the conditions you will be in, plan for things you will need, and have a plan…

Read More
LogRhythm AI Engine: Credential Access: Credential Dumping | MITRE ATT&CK Module

What is ZeroLogon? How to Detect and Patch

TL/DR What is ZeroLogon? In Layman’s Terms ZeroLogon is the name for a Microsoft cryptography vulnerability found in CVE-2020-1472 that makes it easy for cybercriminals to hack into your system by impersonating any computer. The Cybersecurity and Infrastructure Agency has…

Read More

Cybersecurity Infographic: Succeeding as a CISO in 2020

CISOs are under tremendous pressure to deliver — our cybersecurity infographic will help security leaders stay informed on the latest industry trends and statistics in order to find success in 2020 and beyond. Don’t miss these key insights! Cybersecurity Infographic…

Read More

See what we've been working on...

See how we're delivering on promises to better serve our customers