Securing U.S. Cleared Defense Contractors Against Russian State-Sponsored Attacks

State-sponsored attacks frequently target numerous U.S. Cleared Defense Contractor (CDC) networks to obtain critical information and other sensitive assets related to the U.S. government’s national security and defense capabilities. For state-sponsored threat actors, gaining access to highly classified information allows… The post Securing U.S. Cleared Defense Contractors Against Russian State-Sponsored ... Read More

How Much is Enough? A Different Cybersecurity Risk Management Approach

Historically, the fear of cyberthreats put organizations and their IT departments on the defense. So much so they still strive to design security plans that try to protect every part of their infrastructure — data centers, assets, networks — everything.… The post How Much is Enough? A Different Cybersecurity Risk ... Read More
Deployment Manager

Understanding Multi-Tenant Deployments Within the SIEM Platform

The idea of multi-tenant infrastructure and deployments is not new in the cybersecurity landscape. For years, Cisco and Palo Alto firewalls and Citrix and F5 load balancers have supported the idea of a tenant-based deployment.  The idea of supporting tenants… The post Understanding Multi-Tenant Deployments Within the SIEM Platform appeared ... Read More

An Overview of Cloud-Native Security Approaches

Responsibility for cloud security is shared between the cloud service provider’s (CSP) security department and the corporate information security team. In order to ensure compliance, visibility, and control across the entire stack of applications, the cloud service providers and various… The post An Overview of Cloud-Native Security Approaches appeared first ... Read More

Top 8 Benefits of a Remote Internship at LogRhythm

Remote internships can provide a wide range of benefits. Whether you’re a current student or a recent graduate, an internship gives you the chance to apply your skills, advance your career, and try new things. A remote internship may seem… The post Top 8 Benefits of a Remote Internship at ... Read More

Highlights from RSAC 2021: Zero Trust, XDR, Cybersecurity Careers, and More

In the months since the global pandemic impacted the U.S., people shifted to new ways of working and living, and new obstacles to overcome. As if the Covid-19 pandemic wasn’t challenging enough, this year we’ve already witnessed prominent cybersecurity attacks… The post Highlights from RSAC 2021: Zero Trust, XDR, Cybersecurity ... Read More

LogRhythm and Zscaler Partner to Streamline Website Access Control

As cybercrime continues to grow, your network’s security remains a top priority. To protect your network from potential threats, better access control over your network is paramount. Without it, you could be leaving your organization vulnerable to threats. To help,… The post LogRhythm and Zscaler Partner to Streamline Website Access ... Read More
LogRhythm Machine Data Intelligence

Every Security Incident has a Story

You have lots of security tools at your disposal, but do they help you visualize your data to identify threats or quickly resolve security incidents? Do you know what your data is telling you? LogRhythm uses security information and event… The post Every Security Incident has a Story appeared first ... Read More
Automatically blacklist URLs and files

Automate URL and File Blacklisting with Netskope and LogRhythm

While many organizations focus on outside threats, network security shouldn’t be neglected. Having greater visibility into the websites people are searching and the files they are downloading in your network should be a priority. To strengthen your network visibility, LogRhythm… The post Automate URL and File Blacklisting with Netskope and ... Read More

A Guide to Detecting Microsoft Exchange Zero-Day Exploits

TL;DR First and foremost, apply patches to the Exchange infrastructure. Assume compromise. It’s been reported that the attackers launched a massive compromise attack against 60,000+ Exchange Servers before patches became available, and many other attackers are actively looking for exploited… The post A Guide to Detecting Microsoft Exchange Zero-Day Exploits ... Read More

DevSecOps Poll

Step 1 of 6

What is the biggest roadblock implementing DevSecOps practices?