Building a Cybersecurity Architecture to Combat Today’s Threats
The cyberattack surface is growing as organizations implement technologies such as the cloud or the internet of things (IoT). As a result, the traditional perimeter defense approach to security is no longer enough to protect your network. In this on-demand…
Read More
November 7, 2017
Automate Phishing Detection and Response with LogRhythm Phishing Intelligence Engine (PIE)
Modern cybercriminals frequently turn to the phishing email as a means of gaining access to a victim’s network. Phishing campaigns are among the most common and damaging cyberattacks. Despite how common and successful phishing attacks are, often organizations and their employees…
Read More
September 28, 2017
Moving UEBA Beyond the Ground Floor
Insider threats, administrator abuse, and compromised accounts are among the most damaging and difficult to detect threats. User and entity-based analytics (UEBA) solutions are making it possible to detect these advanced threats by employing artificial intelligence (AI) and machine learning.…
Read More
September 27, 2017
Increasing SIEM Visibility with Microsoft’s Azure Log Integration
As more IT resources are deployed in the cloud, ensuring you have security oriented cloud monitoring is critical for protecting your organization. In this Ultimate Windows Security on-demand webinar, explore how Microsoft’s AzLog can help you shrink blind spots by…
Read More
September 27, 2017
Impact of the Modernizing Government Technology Act
Revision 5 of NIST 800 has been delayed to late 2017 or early 2018. As a result, organizations have an opportunity to mature their security operations beyond basic compliance oriented processes and systems. In this webinar, Timothy Young, director of…
Read More
September 13, 2017
How Dell and LogRhythm Transform Security in Federal Agencies
How Dell and LogRhythm are Transforming IT and Security Technology in Federal Agencies Federal security operations teams face the daunting task of limiting our nation’s cyber risk and securing critical data while using outdated hardware and software. Fortunately, the Modernizing…
Read More
July 19, 2017