Blog

Security-Aware Adaptive Networks are Now a Reality

Designing an Adaptive Security Architecture with Unisys Stealth and LogRhythm Detecting internal reconnaissance and lateral movement along the Cyber Attack Lifecycle—also known as the Cyber Kill Chain—can help organizations catch threat actors before they can realize target attainment. However, many SecOps teams face barriers as they work to stop threats and recognize progression from one stage to the next. Gaining early visibility into threats, such as insiders or external actors utilizing compromised credentials, can be impeded or complicated if threats

How to Sell Your Cybersecurity Strategy to the Board: An Interview with James Carder

Today most boards are well aware that cybersecurity is an important issue. But being able to convince them that your cybersecurity strategy is the right one, establish buy-in, and win their budget allocation is not always an easy task. In this interview, James Carder—LogRhythm CISO—shares his experience with executing a successful cybersecurity presentation to the board.

RSA Bound: Thoughts from a First Timer and Industry Newbie, Part 4

In a nutshell, RSA was great. It was wonderful to hear where the industry, our competitors, and cyber criminals are headed. It’s also encouraging to affirm that LogRhythm and our strategic partners are aligned with the industry and our customers from a tactical and strategic perspective.

RSA Bound: Thoughts from a First Timer and Industry Newbie, Part 3

Thoughts from a First Timer and Industry Newbie about RSA 2017. It’s the final day of RSA and I’m still standing (just barely). This week has been a whirlwind of activity, full of sessions, keynotes, a hectic show floor, after parties, and networking. After so much going on, I wanted to take a moment to talk about the themes or topics that have resonated with me the most.