Webcasts

Webcasts

Get the latest tips for solving your security challenges from industry experts.

Identifying Abnormal Authentication

Associating Users with Workstations and Detecting Inappropriate Logons How do you determine when a nosy or potentially malicious insider tries to log on to another user’s workstation with their own account? What’s the best way to find a malicious user…

Read More

An Inside Look: User Behavior Analysis

User and entity behavior analytics (UEBA) and security information and event management (SIEM) are separate security solutions that can work together to detect shifts in behavior that indicate a compromise is occurring. UEBA is enhanced by leveraging the data collected…

Read More

Getting Started with Threat Hunting Basics

Efficient threat hunting can help you better allocate your security resources so your team can focus on the threats that matter. In this on-demand webcast, Andrew Costis, LogRhythm threat research engineer, joins the Security Weekly team to explain how security…

Read More

SANS Reviews LogRhythm CloudAI for UEBA

When threats occur, understaffed security operations centers (SOCs) lack sufficient access to contextual information. This lack of visibility is a key problem that LogRhythm CloudAI for User and Entity Behavior Analytics (UEBA) are designed to solve. In this on-demand webcast,…

Read More

Smarter, Faster Security Through LogRhythm and Cisco Integration

LogRhythm integrates with over three dozen Cisco products, providing centralized visibility and advanced security analytics across the Cisco-enabled environment, and making security events actionable in your network. In this webinar, LogRhythm and Cisco security experts team up to examine how…

Read More

Expanding Threat Lifecycle Management with LogRhythm & Palo Alto

Today’s organizations must face increasingly frequent and complex cyberthreats. Protecting your organization now requires effective threat lifecycle management to address threats across your IT environment. The LogRhythm TLM framework enables you to guard, monitor, and search for threats across your…

Read More

Monitoring Privileged Accounts with Windows Security Log

Hackers have determined a number of ways to harvest privileged account credentials and use them to infiltrate networks. This makes monitoring privileged account usage critical to reducing your organization’s cyber risk. The good news is that Windows provides event ID…

Read More

Moving UEBA Beyond the Ground Floor

Insider threats, administrator abuse, and compromised accounts are among the most damaging and difficult to detect threats. User and entity-based analytics (UEBA) solutions are making it possible to detect these advanced threats by employing artificial intelligence (AI) and machine learning.…

Read More