LogRhythm stories - Page 7

Whitepaper: What is cybercrime doing closer to home?
Thu, 18th Jan 2018
#
siem
#
cybersecurity
#
logrhythm
This new report from Frost & Sullivan delves into APAC's cybersecurity maturity and includes a country breakdown and advice moving forward.

LogRhythm, McAfee, Splunk & IBM round out Leaders in 2017 Gartner Magic Quadrant for SIEM
Tue, 12th Dec 2017
#
siem
#
casb
#
ueba
LogRhythm, IBM, Splunk and McAfee named 'leaders' in Gartner's latest Magic Quadrant for Security Information and Event Management (SIEM).

The ultimate guide to building a security operations centre with limited resources
Mon, 11th Dec 2017
#
siem
#
soc
#
logrhythm
Operating without a SOC means your company could experience major delays in detecting and responding to incidents.

LogRhythm divulges eight key predictions for cybersecurity in 2018
Tue, 5th Dec 2017
#
malware
#
ddos
#
ransomware
The predictions for the new year include both good news and bad news, like the biggest data breach settlement of all time and increased awareness.

New cloud tech helps businesses avoid data breaches
Tue, 5th Dec 2017
#
siem
#
it automation
#
ueba
The tech can automate an extensive range of tasks – including incident response, platform administration and, of course, threat detection.

Why machine learning is essential for cybersecurity
Tue, 5th Dec 2017
#
siem
#
ai
#
logrhythm
Machine learning and AI are becoming indispensable in cybersecurity, promising reduced human effort and quicker incident response.

AI could be the key to ending cybercrime
Tue, 5th Dec 2017
#
ddos
#
data protection
#
siem
Over the last few years, the world has seen a steady and increasing flow of high profile data breaches hitting the headlines...

LogRhythm’s 15 year dream realised with revolutionary CloudAI launch
Mon, 4th Dec 2017
#
siem
#
ueba
#
ai
LogRhythm has taken another innovative step forward after reinventing the definition of SIEM by merging Cloud and AI together.

Attackers will get in: Three frameworks that help you through ransomware
Wed, 22nd Nov 2017
#
malware
#
ransomware
#
siem
Ransomware will breach networks, but frameworks from NIST, SANS, and the Navy can guide organisations in preparing for and mitigating these attacks.

The definitive guide to identifying, qualifying, and responding to cyber threats
Wed, 22nd Nov 2017
#
siem
#
soc
#
ebooks
In order to minimise risk, organisations need to have a cybersecurity strategy that combines comprehensive visibility and advanced analytics.

Four crucial factors to consider when implementing a SIEM platform – Frost & Sullivan
Thu, 16th Nov 2017
#
siem
#
soc
#
ueba
A SIEM is the central nervous system for security analysts in combing through alerts, conducting investigations, devising countermeasures.

CASE STUDY: Achieving full network visibility with SIEM
Thu, 16th Nov 2017
#
siem
#
logrhythm
#
case study
Taking a look at how a rapidly growing business solved their network security woes with a LogRhythm SIEM solution.

LogRhythm celebrates bumper year of accolades for SIEM development
Thu, 16th Nov 2017
#
storage
#
siem
#
ueba
LogRhythm has cemented its pioneering space in the security sector this year, with accolades from the SANS Institute, Gartner and Forrester Wave.

Seagate appoints new APAC vice president of sales
Thu, 27th Jul 2017
#
storage
#
siem
#
seagate
Prior to Seagate, Yang oversaw sales in Asia and Japan for LogRhythm and headed the Asia Pacific sales channels at Hitachi Data Systems.

Practical ways your firm can take action with security analytics
Mon, 3rd Jul 2017
#
storage
#
siem
#
soc
Security is the word on everyone’s lips but what can you really do with the analytics data behind it? LogRhythm and SANS shows how to put it to work.

Not just a buzzword: Ebook reveals how global firms put security analytics to work
Mon, 3rd Jul 2017
#
siem
#
logrhythm
#
research director
Security analytics has gone from buzzword to obligatory application in a very short time. Gartner, BT and the SANS Institute share their secrets.

Petya ransomworm's rapid spread: What the experts know right now
Wed, 28th Jun 2017
#
malware
#
firewalls
#
network infrastructure
The Petya ransomware uses the EternalBlue exploit to not only infect files, but an entire system's drive. We get the latest from the experts.

The 2017-18 Budget: Here’s what Aussie’s cyber security vendors think
Thu, 11th May 2017
#
firewalls
#
network infrastructure
#
siem
The Australian Budget dropped on Tuesday evening, and as per usual, there will be winners and losers - here is the POV from some top IT vendors.

LogRhythm launches partner program alongside security's biggest brands
Tue, 9th May 2017
#
siem
#
soc
#
partner programmes
LogRhythm has launched a Technology Alliance Partner Program and signed up the likes of Carbon Black, Cisco and Palo Alto Networks.

Fight malware by spotting the top eight indicators of threat traffic in your network
Tue, 2nd May 2017
#
malware
#
siem
#
cybersecurity
There are eight main indicators that can help detect compromised networks. Here's how you can catch threat traffic before it cripples your systems.