AMA: Learn How LogRhythm Implemented the WFH Change
As a result of recent events and the COVID-19 pandemic, most organizations are implementing work-at-home policies. Yet company-wide remote environments present unique challenges for IT and cybersecurity professionals. Watch the on-demand webcast today to learn how LogRhythm made the move to a remote workforce and how you can do the same.
Read More
April 13, 2020
Securing a Remote Workforce: How to Get Started
In light of COVID-19, we’ve seen businesses across industries implement remote work policies. This brings about new security concerns, many of which either weren’t considered or prioritized beforehand. Watch the on-demand webinar now to learn how to secure your remote team.
Read More
April 6, 2020
4 Trending Phishing Techniques: Real-Life Examples and Tips for Detection
Many successful attacks begin with a phishing email that some user falls for. And that’s why MITRE prominently features Spearphishing (T1192) as an Initial Access technique in ATT&CK. View the on-demand webinar with Ultimate Windows Security to learn about the latest phishing techniques used by attackers and how MITRE ATT&CK can help detect and remediate these threats.
Read More
March 9, 2020
Leveraging Threat Intelligence Feed Metadata for Better Context and Accuracy
Duration: 01:31:59 Threat feeds are a powerful way to identify attacks that use known infrastructure and malware. Unfortunately, teams can spend a lot of time chasing down alarms triggered by IP addresses that appear on a threat feed. So how…
Read More
January 16, 2020
Pushing the Limits of Network Security Monitoring
Duration: 01:25:35 Good investigators gather the clues they need to crack a case. The best, analyze those clues, make connections, and solve a case quickly. As a threat hunter, you also need to have an effective set of techniques and…
Read More
October 9, 2019
Kubernetes Audit Logging | Kubernetes Security
Duration: 1:24:27 Applications are increasingly being containerized, and when that happens, they are likely to find their way to a cluster within a container-orchestration system like Kubernetes. However, containerized applications are only as safe as the Kubernetes cluster they run…
Read More
September 17, 2019
Aligning Security Solutions with MITRE ATT&CK
Duration: 1:00:30 The MITRE ATT&CK framework is quickly growing in popularity as an effective method to get on the offense of threat detection and response. In this webinar, presenters go beyond definitions and demonstrate how to apply the MITRE ATT&CK…
Read More
June 25, 2019
Threat Detection for Common MITRE ATT&CK Techniques
Duration: 01:43:53 If you’re ready to take a deep dive into applying the MITRE ATT&CK framework and learning how to use it in your environment, then this webinar is for you. In this on-demand webinar, LogRhythm threat research engineers join…
Read More
June 17, 2019
Malicious Traffic: Understanding What Does and Doesn’t Belong on Your Network
Too often, when looking for malicious network traffic, you either search for a known threat actor or investigate anomalous traffic that doesn’t look normal. This reactive approach is time consuming and potentially over-reliant on searching for larger concerns. Fortunately, new…
Read More
April 24, 2019
SANS Automation & Integration Survey: What’s Next in Security Automation?
If your team still heavily relies on manual processes or struggles with a lack of skilled resources, tools, and budget, then automation and integration could be the answer to improve your security operations. Automating everyday security operations will simplify and…
Read More
April 19, 2019
Building MITRE ATT&CK Technique Detection into Your Security Monitoring Environment
The security industry has recently been abuzz with the MITRE ATT&CK framework, and for good reason. The MITRE ATT&CK framework is an open knowledge base of adversary tactics and techniques based on real-world observations. The MITRE ATT&CK provides a common…
Read More
January 31, 2019
SANS Shares Evaluator’s Guide for NextGen SIEM
There’s no question about it: Legacy SIEMs hinder your ability to achieve your security objectives. Traditional solutions are limited and often lack the flexibility to scale and grow as your security needs increase. To combat today’s threats, you need a…
Read More
December 9, 2018