Rightsizing Your SIEM
SC Media 20/20 Webcast SIEM might be old hat for large enterprises, but the explosion of advanced and motivated threats is fueling the SIEM market—even for companies that might not have considered it essential in the past. This can be…
Read More
April 19, 2016
Defending Against Insider Threats: Malicious and Benign
SC Media 20/20 Webcast How safe are you from an insider attack? Despite the numerous press reports of devastating outsider attacks, insider attacks (deliberate or accidental) put your corporation at risk. In this 20/20 webcast with SC Media, James Carder,…
Read More
March 22, 2016
Protecting Your Business from the Ransomware Threat
In this webinar, LogRhythm looks at the business problems surrounding the new and evolved ransomware threat. The webinar also gives you a brief technical overview of how these schemes function and how they can be spotted and responded to early…
Read More
March 21, 2016
PowerShell Audit Logging Deep Dive
Catch Intruders Living off the Land and Enforce Privileged User Accountability PowerShell is like nuclear fission — it’s powerful, and it can be used for good and evil. PowerShell is one of the best post-exploitation tools out there simply because it’s…
Read More
February 16, 2016
Using Windows AppLocker for Immediate Detection of Unauthorized Software
AppLocker is Window’s built-in application whitelisting technology. Despite AppLocker requiring a lot of planning, research and commitment to ongoing care and feeding, in audit mode the application has unlocked potential. Audit mode, provides a really cool way to know immediately…
Read More
December 15, 2015