In the News

DarkReading logo

What to watch for with ransomware: 2017 edition

January 7, 2017

Ransomware will continue to evolve in 2017, bringing new and diverse threats to businesses. What changes are in store?

San Diego Union Tribune logo

Soaring number of computers hijacked for ransom

January 6, 2017

The FBI said every hour, about 4,000 computers around the world become infected with ransomware. That’s just an estimate…

Business Insider logo

Prediction: The internet will shut down for 24 hours next year

December 21, 2016

It’s December, that time of the year when many industry experts make all sorts of predictions for the year ahead. But one prophecy caught Business Insider’s eye: The whole internet will shut down for 24 hours…

Dubai One logo

Interview with Dubai One TV

December 18, 2016

Mazen Dohaji, MENA Regional Director for LogRhythm, speaks about the impact of cybersecurity attacks on a global level…

San Diego Union Tribune logo

Cheers and jeers for Obama’s hard line against Russian hackers

December 16, 2016

President Barack Obama on Friday indicated that the United States will retaliate against Russia for hacking emails and other material from the Democratic National Committee and the Clinton campaign in an effort to help Donald Trump defeat Hillary Clinton in the presidential election…

wWEEK logo

IT professionals hold little back in reaction to Yahoo breach

December 16, 2016

The pioneering search and web services provider, whose home page starts more browser sessions than anybody in the world, revealed Dec. 14 that new security issues had impacted the personal data of more than 1 billion of its users…

Solutions Review logo

7 SIEM and security analytics vendors to watch in 2017

December 14, 2016

In 2017, IT organizations aren’t just fighting hackers and malware—they’re also battling a torrent of data from their own networks…

TechTarget logo

Building a threat intelligence program? How to avoid the ‘feed’ frenzy

December 1, 2016

Cyberthreat intelligence is just data if it is not actionable. We offer tips to help your team focus on relevant CTI for faster threat detection and response…

NetworkWorld logo

New products of the week 11.28.16

November 28, 2016

This latest version of LogRhythm’s security intelligence and analytics platform features more powerful machine analytics, embedded security automation and orchestration, and enhanced performance at scale…

San Diego Union Tribune logo

How should Trump handle nation’s cybersecurity problems?

November 28, 2016

Hackers are everywhere, causing ever more problems, leading many to ask: How should Donald Trump deal with cybersecurity when he becomes president on Jan. 20? It’s an issue he might have to address almost immediately…

Third Certainty logo

Machine learning underlying SIEM systems gets smarter at neutralizing cyber threats

November 23, 2016

ThirdCertainty recently spoke to LogRhythm co-founder and CTO, Chris Petersen, about the machine learning underlying SIEM detection capabilities…

Denver Post logo

Is Windows 10’s built-in security good enough?

November 21, 2016

Built into the operating system is a program called Windows Defender. This is Windows’ version of anti-virus software that is geared toward not only protecting against dangerous files but also dangerous behaviors…

Denver Post logo

Why Microsoft Outlook and other e-mail services know the motel you’re staying at

November 14, 2016

There are two types of companies in the world: Those that know they’ve been hacked and those that don’t. But in this case, there appears to be a third: people who use e-mail…

Denver Post logo

When a cyber stranger wants $300 in iTunes gift cards to fix your PC, please question it

November 7, 2016

Let’s start with obvious: strangers — especially cyber strangers. Huge red flag when they demand money…

Denver Post logo

Messing with telemarketers — just don’t do it, say security experts

October 31, 2016

Before taunting them, it’s important to note that they already have your phone number, name, and possibly other identifying information. This data could be used to cause real harm to you or your family, so it is ill-advised…

The San Diego Union-Tribune logo

Analysts worry that last week’s cyber attack was a ‘trial run’

October 26, 2016

Security experts say that the big cyber attack that hit Twitter, Paypal, Netflix, Airbnb and dozens of other companies last week could be a precursor to a larger assault that deeply impacts American society, possibly during the holiday shopping season…

CSO logo

​IoT, health and other data creates massive value

October 25, 2016

With about five billion IoT devices connected today, with growth expected to reach 25 to 38 billion over the next five years it’s clear something needs to be done to arrest the threat of billions of devices being recruited for nefarious purposes…

TIME logo

How Web Cams Helped Bring Down the Internet, Briefly

October 25, 2016

In a world where we increasingly live and work in giant webs of internet connectivity—our computers and phones, not to mention cameras, thermostats, garage door openers, kitchen appliances and baby monitors are all now connected to the web, often by default…

Yahoo Finance logo

LogRhythm Announces New Global Resale Partnership

October 25, 2016

LogRhythm today announced that it has formed a worldwide resale partnership with Dell EMC. This partnership reflects a long history of collaboration between the two companies, as LogRhythm is one of Dell EMC’s largest OEM customers…

ITP logo

StarLink adds security intelligence and analytics vendor

October 11, 2016

Security-specialised VAD StarLink, has signed a distribution agreement with LogRhythm, a global provider of security intelligence and analytics solutions…

CBR logo

IoT security – the next big cybersecurity issue has arrived

October 10, 2016

According to market watcher Gartner, there will be nearly 26 billion devices on the Internet of Things by 2020. It is also predicted that over 25 percent of identified attacks in enterprises will involve IoT…

TCF Newswire logo

LogRhythm to address Middle East’s growing cybersecurity needs

October 6, 2016

LogRhythm is showcasing its Security Intelligence and Analytics Platform at this year’s installment of GITEX…

IBTimes logo

Yahoo hack: Could data breach scupper Verizon deal?

September 23, 2016

Yahoo’s admission that a “state-sponsored actor” successfully stole account information related to 500 million of users from its computer networks in late 2014 could have serious implications for the deal between the internet firm and its future parent company, Verizon…

The Washington Times logo

Yahoo confirms massive data breach; at least 500 million accounts affected

September 22, 2016

Yahoo officially revealed Thursday that the personal details of more than 500 million account holders were compromised as the result of a security breach being blamed by the company on government-hired hackers…

Misco logo

Majority of companies have experienced a hack in the last five years

September 21, 2016

In the last five years, the majority of businesses (92%) have experienced a data breach, new research by Lloyds of London reveals. Despite this, CEOs remain unconcerned about becoming the subject of another attack in the future, IT Pro reports…

IT Pro logo

Nine in ten companies hacked in last five years

September 20, 2016

Research by Lloyds of London has revealed that 92% of businesses have experienced a data breach in the last five years, yet CEOs are not concerned this could be a sign of things to come, expressing to the insurance market…

iTWire logo

LogRhythm talks next-gen security, fighting ransomware and more

September 7, 2016

At the recent Gartner Security and Risk Management Summit, I caught up with the company’s CMO, Mike Regan, to talk about LogRhythm’s latest security solutions…

Reuters logo

Cyber security firm LogRhythm raises $50 million after changing IPO plans

August 30, 2016

Cyber security company LogRhythm has raised $50 million from private investors after postponing plans for an initial public offering late last year, the company said on Tuesday, the latest sign of how austere the IPO market has become for some technology start-ups…

Denver Post logo

LogRhythm’s user-friendly approach to cybersecurity attracts $50 million

August 30, 2016

Fast-growing LogRhythm is expected to announce Tuesday that it raised another $50 million from investors to speed up its global expansion to help large companies fight
cyber attacks…

CSO logo

Why the death of SIEM has been greatly exaggerated

August 29, 2016

SIEM is not only alive and well, it’s also being put to work by small and mid-sized firms in increasing numbers. They are seeing value in the ability to proactively monitor their growing IT infrastructures and spot threats before they can cause disruption…

TechCrunch logo

How data science fights modern insider threats

August 25, 2016

Insider threats are the biggest cybersecurity threats to firms, organizations and government agencies. This is something you hear a lot at security conference keynotes and read about in data breach reports…

Network World logo

New products of the week 8.8.16

August 8, 2016

LogRhythm’s Network Monitor Freemium is featured by Network World as an intriguing new product…

Silicon Valley Watcher logo

Cybersecurity Costs - An Unsustainable Tax On Business

August 4, 2016

The cost of cybersecurity has become a burdensome tax on business and with 1.5 million IT security jobs unfilled, US corporations are losing to sophisticated criminal gangs, said security experts at a recent event in San Francisco….

Fox News logo

Wikileaks DNC email dump sparks
malware fears

July 29, 2016

The trove of leaked Democratic National Committee emails posted to Wikileaks on July 22 has sparked concerns about malware as users access the vast trove of documents. WikiLeaks posted close to 20,000 emails and 8,000 attachments…

ZDNet logo

Cybersecurity is becoming an unsustainable tax on business

July 28, 2016

The annual costs of cybersecurity are doubling for some firms as huge data breaches force them to hire specialists and buy more software…

CIO logo

​Doing business with Simon Howe of LogRhythm: Know thyself, empower your team

July 27, 2016

We’re focused on protecting against today’s rapidly evolving threat landscape which requires broad and deep visibility across the IT environment. LogRhythm provides profound visibility into threats and risks to which organisations are otherwise blind. Designed to help prevent breaches
before they happen…

CNBC logo

2016 GOP platform endorsing strike-back against hackers

July 27, 2016

While the notion of hoisting cybercriminals upon their own petard is undeniably appealing, experts in the fields of security and technology told CNBC that “hacking back” is little more than a pipe dream…

Computer Business Review logo

Five steps to defend against a
ransomware attack

July 11, 2016

Understanding what happens at each phase of a ransomware attack, and knowing the indicators of compromise [IOCs] to look for, increases the likelihood of being able to successfully defend against—or at least mitigate the effects of—an attack…

DNA logo

LogRhythm opens regional Hq in Singapore to build on momentum

July 6, 2016

Security intelligence and analytics company LogRhythm has announced the opening of its new Asia Pacific and Japan (APJ) headquarters in Singapore to support a growing demand for security intelligence solutions. LogRhythm opened its first office in Singapore in 2014 and has since expanded into Sydney, Melbourne, Hong Kong
and Malaysia…

Security Management logo

Patient Zero

July 1, 2016

Ransomware had compromised the $5 billion health-care provider that operates 10 hospitals and more than 250 outpatient facilities in the Washington, D.C., region, serving thousands of patients and employing more than 30,000. While exact details were not released before Security Management’s press time, attackers hit MedStar on the morning of March 28, launching an attack that prevented certain users from logging in to its systems…

IT Pro Portal logo

Mitigating the insider threat to your business

June 25, 2016

This year, we have seen a steady flow of high profile data breaches hitting the headlines. Whether the result of unknown web vulnerabilities, DDOS attacks or overall lax corporate data security policies, data breaches are becoming an everyday occurrence. In fact, it is generally agreed that no organisation is safe and that hackers will get in – but they can be stopped before they cause damage…

Reseller Middle East logo

eHDF, Netcure and LogRhythm launch Cyber Defense Centre

June 22, 2016

eHosting DataFort (eHDF) has announced the launch a Cyber Defense Centre (CDC) based in the UAE. The Cyber Defense Centre will offer customers a portfolio of Managed Security Services (MSS) along with Remote Managed SIEM Services. The announcement was made at a seminar hosted along with Netcure and LogRhythm at Burj Al Arab, Dubai…

CSO logo

Next-generation SIEM turns low-level security monitoring for high-level business goals

June 16, 2016

Despite an initial rush to adopt security and information event management (SIEM) tools, complex implementations and a lack of skilled staff left many companies struggling to use SIEM effectively. That’s all set to change, however, as a new generation of SIEM tools…

CSO logo

Ransomware explosion is the latest security wakeup call for CxOs

June 16, 2016

The massive data breach of US retailer Target was a wakeup call for senior business executives too often disengaged with cybersecurity issues, but surging ransomware attacks are honing CxOs’ attention on the need for automated analytics tools to detect security breaches as they happen – rather than months later, or not at all…

Straits Times logo

‘Not uncommon’ to limit Internet access,
say experts

June 11, 2016

Pulling the plug on Internet access on work computers is not uncommon in the private sector, say cyber-security experts and industry players, particularly in areas that deal with extra-sensitive information. These include the defence, financial and healthcare industries, but to varying degrees depending on the nature of the work employees do…

Channel News Asia logo

No Internet access for public officers’ work computers by next June

June 8, 2016

To guard against cyberattacks over the Internet and create a “more secure working environment”, the work computers of public officers will have no access to the Internet from next June. Channel NewsAsia speaks to Bill Taylor-Mountford who shares insights…

Bloomberg TV Malaysia logo

Malaysian Banks Not Immune to Cyber Threats

June 8, 2016

Cyber crimes cost the world up to half a trillion dollars a year and Malaysian banks are as much at risk as its global peers, says Bill Taylor-Mountford from security intelligence firm LogRhythm. He speaks to Bloomberg TV Malaysia’s Han Tan and shares how organisations in Malaysia can go beyond regulations and compliance to defend themselves against cyber threats…

Forbes logo

Cybersecurity Startups Set For Surge

June 7, 2016

Venture capital investment in cyberphysical security startups rose 78% to $228 million in 2015, and will rise to S400 million in 2016 as rapid adoption of the Internet of Things (IoT) raises the threat to products such as connected cars, smart homes and future factories, according
to Lux Research…

Security Brief AU logo

Exclusive: New strategies to combat cyber attacks, from LogRhythm

May 31, 2016

Some SMEs are are paying lip service to cyber security, opening themselves up to being just another statistic in the malicious cyber crime game. That’s according to Bill Smith, LogRhythm Senior Vice President of Worldwide Field Operations and Bill Taylor, LogRhythm Vice President of Asia Pacific and Japan…

Built in Colorado logo

Before they were CEOs: what 4 Colorado tech leaders studied in college

May 24, 2016

We were curious how Colorado tech leaders got their start — from their childhood hopes to where they went to college — and it turns out, these four brought some pretty interesting lessons with them on their way to the top…

American Security Today logo

Detect Ransomware, Spear Phishing, APTs & Tier-1 Threats Faster

May 22, 2016

LogRhythm has released Network Monitor 3. This latest version of the industry’s leading network monitoring, analytics and forensics solution empowers organizations to detect, investigate and neutralize today’s most advanced and concerning threats…

SC Magazine logo

SC Magazine Reviewed LogRhythm Against 5 Other SIEM Solutions

May 2, 2016

SC Magazine tested six solutions in their 2016 SIEM and UTM Review. Their review emphasized that LogRhythm’s Security Intelligence Platform is a “heavy-duty tool made for a demanding large environment. It is scalable and complete with the largest list of support connectors we’ve seen yet…

ITProPortal logo

GDPR gains EU approval: Industry reaction
and analysis

April 15, 2016

Yesterday it was announced that the European Parliament officially approved the new Global Data Protection Regulations (GDPR), unifying Europe’s multiple data protection regulations into one common law…

The Register logo

Europe’s new privacy safeguards are finally approved, must invade EU nations by 2018

April 14, 2016

The final seal of approval follows successful passage through the EU Parliament’s Committee on Civil Liberties, Justice and Home Affairs. Following four years of discussions and amendments, the GDPR is now officially EU law and will directly apply in all EU countries, replacing ageing EU and national data protection legislation…

Tech Week logo

European Parliament Approves GDPR Data Protection Law

April 14, 2016

The European Parliament has officially approved the General Data Protection Regulation (GDPR) in Strasbourg, after more than four years of negotiations. The GDPR has been in the planning since January 2012, and it aims to give citizens back control over their data in the digital age, including the right to be forgotten. It also…

SC Magazine logo

European Parliament approves GDPR

April 14, 2016

After four years of work the much vaunted GDPR has been approved by the European Parliament, aiming to usher in a new age of data protection for European citizens and the companies that serve them…

eGov Innovation logo

CIO conversations II: A cyber cold war and two crucial steps towards national defence

April 7, 2016

Robert F Lentz continues: the reality of a cyber cold war, cyber-physical implications of the Internet of Things, baking security into systems at the earliest stages, and advice for developing economies when it comes to cyber-defense, including sharing how LogRhythm’s advanced data analytics engine is going to revolutionize the field and why it’s all about speed of detection and speed of response…

eGov Innovation logo

CIO conversations I: Cybersecurity lessons from the US military

April 7, 2016

Understanding security intelligence has never been more critical as disruptive technologies have not only changed the way companies operate and strategize, but have given rise to more sophisticated threats to the security of enterprise networks and data…

Tech Republic logo

LogRhythm mashes up security and big data to give SMBs better defense in one tool

April 6, 2016

Security Intelligence Management (SIM) can even the playing field between IT and cybersecurity attackers. Here’s how one of the leaders in the space offers a real-time battle strategy….

Healthcare Info Security logo

Ransomware: Time for a HIPAA Update?

March 29, 2016

The recent surge in ransomware attacks on hospitals has at least one member of Congress contemplating whether HIPAA’s breach notification requirements need to be clarified or updated to reflect the trend…

Healthcare Info Security logo

MedStar Shuts Systems After Cyberattack

March 29, 2016

A March 28 cyberattack that may have involved ransomware forced MedStar Health, a 10-hospital system serving Maryland and the Washington, D.C. area, to shut down many of its systems to avoid the spread of the malware…

IT Wire logo

Harnessing your inner SIEM

March 21, 2016

The buzzword in 2015 was cyber threat intelligence (CTI) - everyone wanted useful data and analytical tools for next-gen cyber security to detect and respond to threats faster. The industry responded by providing a plethora of CTI products. Matt Willems, a four-year Labs Engineer at LogRhythm, has written a good overview of CTI and SIEM…

Biz West logo

LogRhythm expanding Boulder presence to accommodate growth

March 16, 2016

Fast-growing cybersecurity firm LogRhythm Inc. is adding more real estate in Boulder, with another 50 employees expected to come onboard locally this year…

logo

Former worker stole secret market data, Ofcom admits

March 11, 2016

The media regulator Ofcom has been forced to tell broadcasters that one of its former employees stole a considerable amount of confidential market information from its database and passed it on to his new employer…

City A.M. logo

An ex-Ofcom employee stole commercially sensitive data about the UK’s major TV broadcasters – and then offered it to
one of them

March 10, 2016

Ofcom has admitted that a former employee stole data from the regulator exposing commercially sensitive information about the UK’s biggest TV companies…

Help Net Security logo

UK businesses fail at security awareness

March 7, 2016

UK organizations are putting their reputation, customer trust and competitive advantage at greater risk by failing to provide their staff with effective security awareness and capability to defend against cyber attacks…

CNET

Not in My House: Amazon’s Unencrypted Devices a Sitting Target, Cybersecurity
Experts Say

March 4, 2016

The news landed like a record scratch Thursday, when security industry heavyweights gathered at the RSA conference in San Francisco heard Amazon plans to stop protecting the data customers store on its tablets and other devices with a technology called encryption…

SC Magazine logo

Only 28% of cyber-attacks are reported
by UK biz

March 4, 2016

Research from the Institute of Directors (IoD) and Barclays says that only 43 percent of the nearly 1,000 IoD members polled know where their data is physically stored. The research said, “This is a truly frightening statistic. It effectively means businesses are losing control of their organisation’s data which may well be the biggest asset of a business.” One fourth of the respondents…

ExecutiveBiz

Lockheed Martin Adds LogRhythm to Cybersecurity Alliance

March 1, 2016

Lockheed Martin will work with LogRhythm on cybersecurity systems integration pilot programs after the latter signed up for the Lockheed Martin Cyber Security Alliance…

Lockheed Martin

LogRhythm Joins Lockheed Martin Cyber Security Alliance

February 29, 2016

Lockheed Martin (NYSE: LMT) announced the addition of LogRhythm, a leader in security intelligence and analytics, to the Lockheed Martin Cyber Security Alliance. Alliance members collaborate to solve growing cybersecurity needs and meet future threats through customer-focused solution design, experiments, and end-to-end systems integration pilots…

AP

Los Angeles Hospital Attack Concerns Cybersecurity Experts

February 18, 2016

Cybersecurity experts worry that the $17,000 a Los Angeles hospital paid hackers to regain control of its computers could signal a troubling escalation of the growing “ransomware” threat…

DNA logo

Critical infrastructure: A clear and
present danger

February 17, 2016

Critical infrastructure like power grids and water supplies has been the target of many theoretical cyber-attacks by academics and white hat hackers for years now, but with the recent shutdown of a power plant in Ukraine by hackers, this threat has now crossed from white-paper territory and into the real world…

ITProPortal logo

Massive web vulnerability puts devices at risk

February 17, 2016

A catastrophic flaw in one of the Internet’s core building blocks may bring a huge amount of apps and hardware devices vulnerable to attacks, according to researchers. A function performing domain-name lookups called getaddrinfo(), contains a buffer overflow bug that allows attackers to remotely execute malicious code. It can be exploited…

Computerworld Singapore logo

Cybersecurity in Asia: Keep your castle safe

January 25, 2016

When it comes to a cyber-attack, it is no longer a question of if your company will be hacked but when. Companies from 2 to 10,000 will get hacked. There’s no question. If you think that’s bad news, then consider this…

Biospectrum logo

Cybersecurity challenge for digitally
connected healthcare

January 22, 2016

As technology drives a revolutionary transformation in the healthcare industry buoyed by the latest innovations in cloud computing, analytics, Internet of Things and other disruptive tech trends, healthcare service providers, including insurers, are rapidly becoming targets of cybercriminals. In fact, the cost of healthcare data breaches could reach $5.6 billion in 2015 according to Experian’s forecast…

WashingtonExec

NIAP Common Criteria Certification Awarded to LogRhythm’s v6.3.4 SIEM Platform

January 20, 2016

It was announced on January 12th by security intelligence company, LogRhythm that it has been granted the National Information Assurance Partnership (NIAP) Common Criteria Certification for its v6.3.4 SIEM platform…

TechBeacon

Takeaways from the latest Gartner Magic Quadrant for SIEM

January 20, 2016

With data breaches making news daily, organizations are looking for effective ways to protect their digital resources…

CSO

Which Certifications Matter Most for Those New to Security

January 13, 2016

Certifications do matter, but an extensive list of certs with no hands-on learning to show that you can apply and utilize that knowledge won’t bode well in many interviews…

Network World

The Incident Response Fab Five

January 11, 2016

CISOs should consider and coordinate incident detection and response in five areas: hosts, networks, threat intelligence, user behavior monitoring, and process automation…

Electronic Health Reporter

Healthcare IT Predictions for 2016

January 8, 2016

Guest post by James Carder, CISO of LogRhythm, VP of LogRhythm Labs…

Forbes

Data Breaches In Healthcare Totaled Over 112 Million Records In 2015

December 31, 2015

According to OCR, there were 253 healthcare breaches that affected 500 individuals or more with a combined loss of over 112 million records…

eForensics and Hakin9

Predictions for Cyber Security in 2016

December 30, 2015

We are pleased to present you our very special project created by joint forces of eForensics and Hakin9 Magazines…

DNA logo

Threat disclosures: Governments still secretive

December 29, 2015

Although security companies have been stressing the importance of sharing threat intelligence and information, many parties – whether in the public or private sector – seem to have things they prefer remain secret. And governments seem to be even more reluctant to share such information, according to LogRhythm cofounder and chief technology officer Chris Petersen, speaking to Digital News Asia in Singapore…

InfoWorld

The Most Innovative and Damaging
Hacks of 2015

December 28, 2015

The year’s most significant attacks highlight how hackers are changing tactics—and how IT security must evolve in the year ahead…

ThirdCertainty

Anatomy of an attack: Flushing out detection-evading malware

December 28, 2015

A single breached endpoint can spread quickly to compromise a business’s entire network…

InnovatioNews

LogRhythm is finalist for two SC
Magazine Awards

December 24, 2015

A panel of business and technology professionals also selected LogRhythm as a finalist in the “Best Computer Forensic Solution” Excellence Award category for the second year in a row…

BFM89.9 logo

Staying Connected Safely

December 23, 2015

In this connected age, information that could be used by hackers can be found anywhere. There are no longer safe industries as hackers target information that they could sell – and it’s troubling to know that 60% of attacks are due to compromised credentials. We speak to Bill Taylor-Mountford, Vice President for Asia Pacific and Japan at LogRhythm, to find out if we’re doing enough to educate on security risks and precautions to take…

WHNT News 19

How changing your approach to technology can protect you from major hacks

December 21, 2015

WHNT News 19 has reported many times on the need for checking credit reports and monitoring bank accounts to watch for signs of a hack. Unfortunately, those are steps that can only be taken once the damage is done. To protect yourself before hackers strike, you might need to re-think how you use technology…

WHNT News 19

Where your personal information goes after a massive hack

December 21, 2015

In recent years, millions and millions of Americans have had information about them stolen in major cyber hacks. You may be one of those impacted. So, what do hackers do with all of that data? They often head to a secretive corner of the Internet, where there’s a growing and lucrative market for your personal info…

WHNT News 19

How all those cyber hacks happen and how they get so massive

December 21, 2015

Millions and millions of people have had sensitive personal information stolen. If you’re like us, you may have asked yourself “How do these massive hacks keep happening?” and “How can they get so big?”…

Healthcare Dive

Peering into the health IT crystal ball for 2016

December 17, 2015

As healthcare IT becomes increasingly driven by factors including security, analytics and interoperability, industry leaders are looking ahead at what trends and technologies are likely to lead in 2016…

South China Morning Post logo

Cyberattack could catch Asian banks off-guard

November 8, 2015

Recall the last unprecedented data leak at a major Asian bank? Probably not. Because it was never reported to the public, nor to the customers whose personal information was swiped by cyber thieves. Few Asian nations have mandatory disclosure rules that, like in the United States, force banks and companies to make painful admissions on cyberattacks…

CSO

When the cyber security threat
comes from within

November 5, 2015

As cyber attacks are appearing more regularly in news reports, organisations are slowly coming around to the fact that it has become a case of when they will be targeted, not if…

CSO

Hostile nations have breached U.S. infrastructure. But don’t panic.

November 5, 2015

For years, government officials and security experts have warned that the security of the nation’s critical infrastructure is drastically porous…

Security Asia logo

LogRhythm 7 accelerates cyber threat detection and response

October 14, 2015

LogRhythm has unveiled LogRhythm 7, a major upgrade to its leading security intelligence and analytics platform. New innovations in search, scalability, performance and security operations efficiencies will help organizations detect and respond faster to advanced cyber threats…

DarkReading

LogRhythm 7 Accelerates Cyber Threat Detection & Response via Revolutionary Search, Optimization in Processing
and Indexing

October 8, 2015

Version 7 of the LogRhythm security intelligence and analytics platform provides the visibility, automation and incident response orchestration capabilities required by the next-generation security operations center (SOC)….

Risk Management

Developing a Cyberbreach Strategy

October 1, 2015

Throughout the business world, breaches have become a constant reminder of the critical need to assess and take action on cyberrisk. But they can also make addressing the issue seem like an ever more daunting task…

TechTarget

How to deploy the right DLP products for the right jobs

Nation states, cybercriminals and unscrupulous competitors are all vying to steal sensitive information from vulnerable organizations. Data loss prevention (DLP) products help organizations…

GovCon Executive

Symantec’s Al Cooley, LogRhythm’s James Carder to Discuss Intell-Based Cyber Protection Methods

September 25, 2015

Symantec’s Al Cooley and LogRhythm’s James Carder are set to describe the steps for combating cyber attacks using threat intelligence in a webinar…

iTWire

Poor password hygiene encourages dirty cyber-crime

September 17, 2015

Poor password security is one of the major factors in advancing the threat timetable….

NetworkWorld

The Network’s Role as a Security Sensor and Policy Enforcer

September 15, 2015

According to ESG research, 79% of cybersecurity professionals working at enterprise organizations (i.e. more than 1,000 employees) believe that network security management and operations is…

NetworkWorld

12 habits of successful tech CEOs

September 14, 2015

Andy Grolnick donned a suit coat and tie and readied himself for a frothy commute. The CEO of LogRhythm was among 200 people who tubed down Colorado’s Boulder Creek, outfitted in helmets and business attire…

Innovators Peak

The 7 Best Workplaces in Denver and Boulder

September 9, 2015

Jobs: most of us have a love-hate relationship with them. If you lean considerably more toward the “hate” side, though, maybe it’s time to start sniffing around. Luckily for you, we’ve curated our own list of the top places to work in the Denver/Boulder area…

Bank Info Security logo

Singapore Debates Breach Disclosure

September 1, 2015

Data privacy experts in Singapore call for mandatory reporting of data breaches, similar to the guidelines issued by some U.S. and Canadian government entities, and making the measure binding on enterprises and citizens alike. It is critical for Singapore regulatory authorities to determine the type of breaches that need reporting, these leaders say…

Bank Info Security logo

Singapore businesses need to step up their data security measures: LogRhythm

August 17, 2015

Organisations and individuals in Singapore need to take a more proactive approach when it comes to addressing data security, urged LogRhythm. According to the security intelligence and analytics firm’s recent study, 52 percent of employees in Singapore faced security events in the last few years. Security events could be a breach, virus attack, or unauthorised access of information…

Integration Developer News

LogRhythm Extends Threat Analytics Suite with Endpoint Module

A security breach usually occurs in mere minutes, but in most organizations, detecting an intrusion can take days, maybe weeks. LogRhythm aims to help IT more quickly detect intruders with its latest offering Endpoint Threat Analytics Module…

Data Breach Today logo

Harnessing Security Intelligence

July 31, 2015

Most analyst groups say that by 2020, enterprises will be in a state of continuous compromise, the Asia Pacific region being no exception. Technologists, then, are seeking new ways to educate customers and practitioners about developing an effective breach response mechanism. The fundamental success of a defense mechanism requires using security intelligence in the right manner, combined with…

Health Care Tech Outlook

Healthcare Data Security is Decades Behind: How it Must Catch Up

July 1, 2015

Cybercrime is on the rise in 2015, dubbed “the year of the healthcare hack” as healthcare providers receive federal incentives to implementnew Electronic Health Record systems…

The Denver Post

Hacked? Cyber attacks push security industry to plug weak links

June 21, 2015

With US officials saying we have all been hacked, James Carder talks to The Denver Post about how hackers are taking advantage of low-hanging fruit, why people are still the weakest link and which industry he thinks will be hacked next…

The Denver Post

Experts’ Tips on Staying Ahead of Cyber Scum

May 11, 2015

LogRhythm teamed up with Webroot and the Denver Post to answer reader’s security related problems and questions…

Third Certainty

C-suite must act early, often to prevent
data breaches

May 6, 2015

Continuing fallout from the headline-grabbing data breaches at Target, Home Depot, Sony Pictures, Anthem, Premera and dozens of other organizations since late 2013 certainly have grabbed the attention of C-suite execs worldwide. And the forced resignation of Target CEO Gregg Steinhafel—on whose watch the retail giant lost personal data for 110 million customers—drove home the personal career risks introduced by pervasive hacking…

The Wall Street Journal

James Carder Leaves Mayo Clinic for CISO Role at LogRhythm

May 5, 2015

James Carder, former director of security informatics at Mayo Clinic, has left the health-care sector to join security vendor LogRhythm as chief information security officer….

TECH NEWS World

Apple Watch Could Be a Password Alternative

April 30, 2015

As if any more evidence were needed about the insecurity of passwords, LogRhythm released the latest in a long line of surveys finding that users continue to ignore good password hygiene…“Weak and stolen credentials is still one of the most common threat vectors used by the bad guys,” said Mike Reagan, chief marketing officer at LogRhythm…..

Enterprise Innovation logo

4 in 5 employees use same password for different accounts

April 27, 2015

Only 21% of employees create unique passwords for each of their online accounts, according to a national password survey commissioned by LogRhythm. The survey polled 520 full-time employees at organizations with 250 or more employees in various industries including healthcare, retail, manufacturing, utilities/energy, education, banking and automotive…

Dark Reading

Russian Hackers Breached White House Via US State Department

April 8, 2015

Attackers compromised an unclassified White House system in October by sending spearphishing messages from a hijacked US State Department email account, US officials say. Though unclassified, the system did include some sensitive communications in the executive office, including President Obama’s schedule…

NetworkWorld

A Security Intelligence reference model to assess your security posture

April 2, 2015

At no time in history has there ever been such a concentrated focus on the importance of cyber security, and for good reason. With cyber threats now being labeled a matter of national security, the important thing for companies is to keep growing their security maturity and reducing their overall risk posture…

The Boulder Daily Camera

Boulder approves $75,000 incentive
for LogRhythm

February 20, 2015

The city of Boulder has approved an incentive package of up to $75,000 in taxes and fees rebates to LogRhythm Inc., the security software firm that recently expanded its local operations…

Fortune

Anthem, a major health insurer, suffered a massive hack. Here’s what you need to know.

February 5, 2015

Anthem, the second-largest health insurer in the United States, announced that it had succumbed to a massive cyber attack. It may be the largest hack to hit the health care industry to date. Chris Petersen, CTO and co-founder of LogRhythm, provides insight saying: “The barrier to entry for cybercriminals continues to decrease, and personal health information can trade at a premium on the black market. Healthcare providers and insurers are a veritable treasure trove for would-be attackers. The Anthem breach should put all healthcare providers and insurers on notice…

CBS News

Security Expert: Protect Yourself After
Anthem Hack

February 5, 2015

Health insurer Anthem is investigating after confirming that hackers infiltrated its computer network and accessed a wealth of personal information about their customers. LogRhythm, believes the Anthem hack should put all health care providers on alert. “That data can be valuable for identity theft but also valuable for extortion. If I know you have a certain disease I might come after you and extort money from you… It’s terrifying,” said LogRhythm CTO and co-founder Chris Petersen…

Third Certainty

Anthem on hook for HIPAA violations

February 5, 2015

By letting hackers exfiltrate Social Security numbers and other personal data for possibly as many as 80 million individuals, the nation’s second largest healthcare insurer has set itself up to become the poster child for sanctions likely to be imposed under the 1996 Health Insurance Portability and Accountability Act, (HIPAA). Chris Petersen, CTO and co-founder of LogRhythm cautioned, “The bad guys are coming after the healthcare sector… It holds valuable data for which there is black market demand… Those that don’t start improving their ability to quickly detect compromises, monitor for threats, and respond quickly, will have patient data breached – period…

The Denver Post

Anthem breach a wake-up call to health
care industry

February 5, 2015

In the latest breach of health insurer Anthem Inc. no credit cards or medical information “were targeted or compromised,” though a list of very personal details of 80 million members and employees was. In the aftermath to reduce risk CTO and co-founder LogRhythm, Chris Petersen, recommended affected customers should stay on top of their financial transactions and demand credit monitoring…

Colorado Business

$758M in funding and $11B in exits: Colorado tech just had its best year ever

January 29, 2015

Colorado tech companies increased their funding and exit totals in 2014, making it the best year on record for the state’s digital tech economy…

NBC News

The Year in Cybersecurity: 5 Threats to Watch in 2015

December 30, 2014

Here are five types of attacks that cybersecurity experts say will be cracking computers in 2015 “Experts have been calling it a ‘cyber Cold War’ for some time, and that’s only ramping up quickly,” said Chris Petersen, CTO and co-founder of security intelligence company LogRhythm. “Nation-states both weak and strong see cyberattacks as a weapon to counter the global influence of the U.S…