Smarter, Faster Security Through LogRhythm and Cisco Integration
LogRhythm integrates with over three dozen Cisco products, providing centralized visibility and advanced security analytics across the Cisco-enabled environment, and making security events actionable in your network. In this webinar, LogRhythm and Cisco security experts team up to examine how…
Read MoreFebruary 22, 2018
Optimize Phishing Detection and Response with LogRhythm and Office 365
Today’s hackers often favor the phishing email as their weapon of choice. Phishing attacks are not only common, but are also very difficult to defend against. What if you could detect and mitigate a phishing attack before its intended target…
Read MoreDecember 15, 2017
Monitoring Privileged Accounts with Windows Security Log
Hackers have determined a number of ways to harvest privileged account credentials and use them to infiltrate networks. This makes monitoring privileged account usage critical to reducing your organization’s cyber risk. The good news is that Windows provides event ID…
Read MoreNovember 27, 2017
How to Recognize Malicious DNS with Free Network Monitoring Tools
Domain Name System (DNS) is woven into the fabric of both the internet and corporate intranets. It works so well that you might even forget it exists — until it is used against you. Hackers haven’t forgotten or ignored DNS.…
Read MoreNovember 8, 2017
Building a Cybersecurity Architecture to Combat Today’s Threats
The cyberattack surface is growing as organizations implement technologies such as the cloud or the internet of things (IoT). As a result, the traditional perimeter defense approach to security is no longer enough to protect your network. In this on-demand…
Read MoreNovember 7, 2017
Automate Phishing Detection and Response with LogRhythm Phishing Intelligence Engine (PIE)
Modern cybercriminals frequently turn to the phishing email as a means of gaining access to a victim’s network. Phishing campaigns are among the most common and damaging cyberattacks. Despite how common and successful phishing attacks are, often organizations and their employees…
Read MoreSeptember 28, 2017