Blog - page 8

Detecting the BlackNurse DDoS Attack with Network Monitor

The security operations centre (SOC) at Danish telecoms operator TDC recently published a report with regards to an ICMP based DoS/DDoS style of attack. In the spirit of proactive defence, I thought it was a good idea to see how this type of attack would look within [LogRhythm Network Monitor Freemium.

Read More

The Best Gets Better: Introducing LogRhythm 7.2

LogRhythm 7.2 builds upon the groundbreaking innovations in LogRhythm 7.1 to minimize total cost of ownership and enable end-to-end threat lifecycle management. Learn more about our latest release.

Read More

The Definitive Guide to Security Intelligence and Analytics

In the Definitive Guide to Security Intelligence and Analytics e-book, you'll learn how your organization can benefit from adopting security intelligence and analytics, how to evaluate possible solutions, and tips and tricks on deploying a solution so you can get the most value from it. Read more to learn how to automate event discovery through security analytics and to get the free e-book.

Read More

Detecting Home Network Issues with Network Monitor

Analyzing home network traffic can be highly valuable as you can find previously unknown issues smoothly and efficiently by using Network Monitor. In addition to security issues, you can also track usage statistics and determine what (or who) is utilizing the most bandwidth on your home network.

Read More

Making Security Intelligence a Standard Operating Procedure

We often do not know what we are looking for, and therefore, we need assistance in correlating all of the information. What we do know is that we need to make security intelligence a standard operating procedure (SOP) for all agencies, organizations, and individuals in order to effectively and efficiently cut through the noise and determine actionable intelligence to move the defense of our critical infrastructure forward.

Read More

Building Resilience in Critical Infrastructure

It’s National Cyber Security Awareness Month, and the theme for the final week is “Building Resilience in Critical Infrastructure.” So why is this a focus for the National Cyber Security Alliance? Well initially, cyber threats were focused on profitable data breaches with an attainable payload (e.g., credit card information, industry secrets, etc.). But now, nation states and hacktivist groups are focusing on accessing and disrupting critical infrastructure in the United States.

Read More

Building and Implementing a Next-Gen SOC

Building and implementing a next-generation Security Operations Center (SOC) can seem like a daunting endeavor. The sheer number of technologies to consider, which seems to grow regularly, creates a dizzying array of technical options and capability permutations.

Read More