Labs

How to Sell Your Cybersecurity Strategy to the Board: An Interview with James Carder

Today most boards are well aware that cybersecurity is an important issue. But being able to convince them that your cybersecurity strategy is the right one, establish buy-in, and win their budget allocation is not always an easy task. In this interview, James Carder—LogRhythm CISO—shares his experience with executing a successful cybersecurity presentation to the board.

Passive Discovery and Exploitation of Open SMB Shares

Server Message Block (SMB) shares are a critical component to most organizations—allowing for a central repository of files and other items that people need to access and share to do their jobs. As a security professional, it is critical that you identify these vulnerabilities within your environment and lock them down.

User Threat Detection—There’s a Module for That

End-user behavior can be difficult to baseline and monitor. Where traditional analytics and perimeter defenses fall short, LogRhythm’s User and Entity Behavior Analytics (UEBA) capabilities add an additional layer of security enabling the rapid detection of dangerous user activity.