Defending Against Cyberthreats: Are You Keeping Up?
An Analysis of CyberEdge’s 2016 Cyberthreat Defense Report Despite record security spending, successful cyberattacks are on the rise. Seventy-six percent of organizations around the globe were compromised by a successful cyber attack in in 2015—up from 62% in 2014. Steve…
Read MoreMay 11, 2016
Security Experts from Cisco and LogRhythm Reveal an Integrated Solution for Threat Protection
LogRhythm Partner Webcast In this webinar, Paul Davis, director of advanced threats security solution architects at Cisco, and Bruce Deakyne, technical product manager at LogRhythm, will explain how LogRhythm’s platform continually consumes and analyzes dynamic malware and threat intelligence data…
Read MoreApril 22, 2016
Rightsizing Your SIEM
SC Media 20/20 Webcast SIEM might be old hat for large enterprises, but the explosion of advanced and motivated threats is fueling the SIEM market—even for companies that might not have considered it essential in the past. This can be…
Read MoreApril 19, 2016
Defending Against Insider Threats: Malicious and Benign
SC Media 20/20 Webcast How safe are you from an insider attack? Despite the numerous press reports of devastating outsider attacks, insider attacks (deliberate or accidental) put your corporation at risk. In this 20/20 webcast with SC Media, James Carder,…
Read MoreMarch 22, 2016
Protecting Your Business from the Ransomware Threat
In this webinar, LogRhythm looks at the business problems surrounding the new and evolved ransomware threat. The webinar also gives you a brief technical overview of how these schemes function and how they can be spotted and responded to early…
Read MoreMarch 21, 2016
PowerShell Audit Logging Deep Dive
Catch Intruders Living off the Land and Enforce Privileged User Accountability PowerShell is like nuclear fission — it’s powerful, and it can be used for good and evil. PowerShell is one of the best post-exploitation tools out there simply because it’s…
Read MoreFebruary 16, 2016