SIEM data exfiltration playbook for compliance

How to Leverage Case Playbooks for Compliance 

| | LogRhythm Labs
Mature security processes should involve leveraging playbooks to guide their responses to potential breaches and ensure compliance with regulations. These playbooks serve as dynamic blueprints, outlining predefined steps, protocols, and best practices tailored to specific scenarios. Harnessing the power of… The post How to Leverage Case Playbooks for Compliance  appeared ... Read More

Generative AI and Cybersecurity: The Impact on CISOs and Security Teams

| | Security Tips and Tricks
Generative AI, a subset of artificial intelligence (AI), has emerged as a transformative force in the today’s digital world. This kind of advanced technology uses machine learning models to generate content, enabling it to autonomously create new and innovative solutions.… The post Generative AI and Cybersecurity: The Impact on CISOs ... Read More
How To Monitor Kubernetes Audit Logs

How To Monitor Kubernetes Audit Logs

| | Security Tips and Tricks
In today’s fast-paced landscape of container orchestration, Kubernetes is a powerful tool for managing and scaling applications. However, ensuring the security and compliance of these environments cannot be overlooked. One crucial aspect of building a successful application includes handling Kubernetes… The post How To Monitor Kubernetes Audit Logs appeared first ... Read More

Why SaaS SIEM? A Comprehensive Guide for Businesses

Today’s businesses are increasingly reliant on technology, meaning the importance of airtight cybersecurity cannot be overstated. As organizations navigate the complexities of the modern digital ecosystem, maintaining the integrity of their systems has become more than just a “nice to… The post Why SaaS SIEM? A Comprehensive Guide for Businesses ... Read More

Securing Operational Technology in Healthcare — Introducing a New Module

Current Healthcare Cybersecurity Landscape The global healthcare industry is vastly diverse, encompassing areas such as provider services and managed care, pharmaceuticals and biotechnology, distributors and facilities, along with supplies and equipment. With that, the digital transformation of healthcare data, remote… The post Securing Operational Technology in Healthcare — Introducing a ... Read More

2024 Cybersecurity Predictions

Entering a new year, the cybersecurity landscape is poised for significant shifts, driven by the dynamic interplay between technological advancements and persistent threats. In this blog, industry experts share their insights and predictions, offering a nuanced perspective on the cybersecurity… The post 2024 Cybersecurity Predictions appeared first on LogRhythm ... Read More
Q4 2023 Security Use Cases: Insights From Success Services

Q4 2023 Security Use Cases: Insights From Success Services

| | Success Services
As part of Success Services, this past quarter LogRhythm consultants have been hard at work helping customers improve their defenses against cyberthreats. This quarter, the team observed a shift in attack vectors back into Credential evasion via NTLM, DC manipulation, and… The post Q4 2023 Security Use Cases: Insights From Success ... Read More
Cybersecurity use case graphic: Monitoring for Disabled Users

Q3 2023 Analytic Co-Pilot Use Cases

| | Analytic Co-Pilot
As part of the Subscription Services team, the consultants delivering the Analytic Co-Pilot Service, have come together to share Q3 2023 security use cases we have worked on in our own internal environments, as well as with LogRhythm customers. We… The post Q3 2023 Analytic Co-Pilot Use Cases appeared first ... Read More

Artificial Intelligence – A Danger to Patient Privacy?

Industries worldwide have integrated artificial intelligence (AI) into their systems as it promotes efficiency, increases productivity, and quickens decision-making. ChatGPT certainly raised eyebrows as it demonstrated similar characteristics at the start of its debut back in November 2022.  The healthcare sector… The post Artificial Intelligence – A Danger to Patient Privacy? ... Read More
SaaS vs. Cloud-Native: Definitions and Security Best Practices

SaaS vs. Cloud-Native: Definitions and Security Best Practices

There’s a disconnect in how we talk about applications that are no longer hosted within our own data center. When speaking with customers, we’ve observed that “software as a service” (SaaS) and “cloud-native” are terms that tend to be bundled… The post SaaS vs. Cloud-Native: Definitions and Security Best Practices ... Read More