With so many phishing attacks targeting credentials, more organizations are realizing they need multi-factor authentication (MFA) for users with access to critical data.
In this webinar, four-time Microsoft MVP Nick Cavalanci, along with LogRhythm Threat Research Engineers, Sally Vincent and Dan Kaiser, discuss:
Sally and Dan guide you through an analysis of MFA product logs relevant to detect unusual authentication activity. Throughout their threat hunting example, you will observe real-time detection of multi-factor authentication request generation using LogRhythm’s dashboarding, investigation, and real-time analytics capability.
Watch this live webinar to gain more insight into MFA prompt bombing and mitigation strategies!
Security strategies are evolving; driven by regulatory requirements, customer expectations around data privacy and AI-driven…
In our April 2024 quarterly release, LogRhythm Axon showcases new enhancements from its two week…
In our April 2024 quarterly release, LogRhythm SIEM introduces new enhancements to bring you faster…