Optimize Phishing Detection and Response with LogRhythm and Office 365
Today’s hackers often favor the phishing email as their weapon of choice. Phishing attacks are not only common, but are also very difficult to defend against. What if you could detect and mitigate a phishing attack before its intended target…
Read MoreDecember 15, 2017
Monitoring Privileged Accounts with Windows Security Log
Hackers have determined a number of ways to harvest privileged account credentials and use them to infiltrate networks. This makes monitoring privileged account usage critical to reducing your organization’s cyber risk. The good news is that Windows provides event ID…
Read MoreNovember 27, 2017
How to Recognize Malicious DNS with Free Network Monitoring Tools
Domain Name System (DNS) is woven into the fabric of both the internet and corporate intranets. It works so well that you might even forget it exists — until it is used against you. Hackers haven’t forgotten or ignored DNS.…
Read MoreNovember 8, 2017
Building a Cybersecurity Architecture to Combat Today’s Threats
The cyberattack surface is growing as organizations implement technologies such as the cloud or the internet of things (IoT). As a result, the traditional perimeter defense approach to security is no longer enough to protect your network. In this on-demand…
Read MoreNovember 7, 2017
Automate Phishing Detection and Response with LogRhythm Phishing Intelligence Engine (PIE)
Modern cybercriminals frequently turn to the phishing email as a means of gaining access to a victim’s network. Phishing campaigns are among the most common and damaging cyberattacks. Despite how common and successful phishing attacks are, often organizations and their employees…
Read MoreSeptember 28, 2017
Moving UEBA Beyond the Ground Floor
Insider threats, administrator abuse, and compromised accounts are among the most damaging and difficult to detect threats. User and entity-based analytics (UEBA) solutions are making it possible to detect these advanced threats by employing artificial intelligence (AI) and machine learning.…
Read MoreSeptember 27, 2017