Blog

A Roundup of LogRhythm’s Most Visited Technical Blog Posts

The LogRhythm blog is an abundance of content and insight from our LogRhythm Labs team, security tips and tricks, threat research, infosec news, use cases from our customers, and more to help you stay at the top of your game…

RhythmWorld Logo

RhythmWorld 2020 Security Conference is Going Virtual

Our annual RhythmWorld Security Conference is a source of pride for the entire LogRhythm team. We love interacting with our customers and partners in person every year and aim to exceed expectations with world-class speakers, content, entertainment, and fun networking…

7 Steps to Building A Security Operations Center (SOC)

Most Organizations are Not Equipped to Staff a 24X7 SOC Unfortunately, cyberattacks such as WannaCry and Petya/NotPetya are increasingly becoming the norm. Keeping up with the growing rate of cybersecurity threats may seem impossible when your business is lacking in-house…

Man looking at desktop computer monitor.

4 Key Processes to Maximize Security Operations Center Procedure Effectiveness

Building a security operations center (SOC) is a major undertaking, but it’s worth the effort to keep your organization secure. To create an efficient SOC, you need to develop security operations center procedures that connect people, processes, and technologies within…

Doctor working on digital tablet on hospital background

LogRhythm Joins NCCoE’s Technology Collaborators to Help Secure Telehealth Remote Patient Monitoring Ecosystem

It is with great excitement that I share LogRhythm’s involvement in the newest healthcare project from the National Cybersecurity Center of Excellence (NCCoE) — Securing Telehealth Remote Patient Monitoring Ecosystem. The project aims to provide a reference architecture that will…

Monitoring Remote Worker on VPN

A Security Analyst’s Guide to Monitoring Remote VPN Activity in the LogRhythm SIEM

Remote work is no longer a trend, and is becoming the norm for many companies. Whether your organization has been practicing remote work for a while, or it is just beginning to adopt work-from-home policies, VPN monitoring — the ability…

Use Case: Detect and Respond to Malware Traffic with NDR

As malicious actors continue to use a variety of techniques to evade detection, it’s paramount to protect your organization’s network activity. You need a solution that can detect and prevent malicious network activity. One solution is network detection and response…

prevent data exfiltration with network traffic analytics

Prevent Data Exfiltration with Network Traffic Analytics

When it comes to company data, you need to protect it at all costs. But it is hard to defend what you can’t see. This blog post will explore techniques threat actors commonly use to illegally copy an organization’s data,…

LogRhythm Debuts Remote Workforce Offering to Help CISOs Quickly Gain Greater Visibility

Contributors to this blog include Andrew Hollister and James Carder.  As security and IT teams are dealing with the complications of maintaining security and operations of the business during the stay-at-home order due to the coronavirus and are now managing…

What is Network Detection and Response?

Networks are becoming more complex and widely distributed, so full visibility is more critical than ever before to being able to detect and stop threats before they become a breach. We have all read headlines about companies that suffered from…