NetMon & Behavior Analysis
Achieve Real-Time Network Visibility When attackers compromise the perimeter or are operating from within, you need to know. You can only stop attackers from gaining a foothold in your network to expand their presence if you can see them. The…
Read More
September 23, 2016
Triage: The Art of Threat Detection and Risk Assessment
In healthcare, medical professionals use triage procedures to quickly assess, prioritize and allocate the right resources to treat patients, adjusting their response to the severity of the situation. Similar to healthcare, today’s cybersecurity teams are dealing with a constant barrage…
Read More
September 19, 2016
Activated Charcoal
Making Sense of Endpoint Data Security operations is all about understanding and acting upon of large amounts of data. When you can pull data from multiple sources, condense it down and correlate across systems, you are able to highlight trends,…
Read More
September 6, 2016
Mitigating Risk of Cybersecurity Exploits to Medical Devices in Hospital Networks
As the need for a cost-effective patient care increases, developments and innovation in healthcare technology accelerates. Nowadays, the numerous advances in sophisticated network enabled medical devices allow increased cooperation and communication between patients, healthcare centers, and manufacturers. This direct connection…
Read More
August 30, 2016
Beyond the Sticker Price
Factors Impacting the Total Cost of Ownership of a SIEM Many organizations today are losing the race against the hacker community by a large margin. As noted in the Verizon 2016 Data Breach Investigation Report, the percent of compromises that…
Read More
August 18, 2016
Top 8 Things to Analyze in Outbound Packets
Most modern malware operates as part of a system. Whether it’s a multi-part kill chain with droppers and payloads, a botnet with command and control servers, or ransomware encrypting files, the malware on the compromised system talks to other systems…
Read More
August 16, 2016
SANS 2016 Incident Response Survey
Emerging Trends in Incident Response and Survey Results This webinar will cover the results of the third annual SANS survey on incident response. It will explore the continuing evolution of incident response, how tactics and tools have changed in the…
Read More
June 9, 2016
Discover hidden threats with User Behaviour Analytics (UBA)
As a cyber security professional, you already know that users are both an organisation’s greatest asset and its greatest vulnerability. Users can do great damage— and they’re notoriously difficult to catch. Many companies are confronting this challenge with User Entity…
Read More
May 26, 2016
Do You Really Know Your Users?
How User Behavior Analytics Can Help You to Detect User Threats As a cybersecurity pro, you already know that users are both an organization’s greatest asset and its greatest vulnerability. Users can do great damage—and they’re notoriously difficult to catch.…
Read More
May 17, 2016
Leveraging your SIEM to Catch and Respond to Ransomware
Free Training Brought to you by LogRhythm and Ultimate Windows Security Over the past three years, ransomware has jumped into the spotlight of the cyber threat landscape. In fact, the FBI estimates that $1 billion in losses will be incurred…
Read More
May 12, 2016
Defending Against Cyberthreats: Are You Keeping Up?
An Analysis of CyberEdge’s 2016 Cyberthreat Defense Report Despite record security spending, successful cyberattacks are on the rise. Seventy-six percent of organizations around the globe were compromised by a successful cyber attack in in 2015—up from 62% in 2014. Steve…
Read More
May 11, 2016
Security Experts from Cisco and LogRhythm Reveal an Integrated Solution for Threat Protection
LogRhythm Partner Webcast In this webinar, Paul Davis, director of advanced threats security solution architects at Cisco, and Bruce Deakyne, technical product manager at LogRhythm, will explain how LogRhythm’s platform continually consumes and analyzes dynamic malware and threat intelligence data…
Read More
April 22, 2016