Monitoring USB Usage with Windows Logs – Security Spotlight
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about how you can…
Read More
December 14, 2023
On-Prem SIEM vs. Cloud-Native SIEM: Which One Is Right for You?
Security information and event management (SIEM) solutions are essential for organizations of all sizes to monitor their environment for security threats. SIEM solutions gather and scrutinize security logs originating from diverse sources like firewalls, intrusion detection systems, and web servers.…
Read More
December 8, 2023
Disable Windows Event Logging – Security Spotlight
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about a technique attackers…
Read More
November 28, 2023
Detecting Token Impersonation – Security Spotlight
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about a common method…
Read More
November 21, 2023
Detecting Domain Name Abuse – Security Spotlight
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about a cool open-source…
Read More
November 14, 2023
How LOLBAS Is Used in MS Process Abuse – Security Spotlight
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about LOLBAS and highlighting…
Read More
November 7, 2023