Kelsey Gast, Author at Security Boulevard

3 Reasons to Attend RhythmWorld 2021

| | Security Tips and Tricks
RhythmWorld is back and better than ever before! LogRhythm’s fifth annual cybersecurity conference starts Tuesday, October 12th, and we’ve already surpassed last year’s record-breaking attendance numbers. We are taking this year’s RhythmWorld agenda to the next level — the schedule… The post 3 Reasons to Attend RhythmWorld 2021 appeared first ... Read More
Graphic showing AWS cross-accounts

Detecting AWS Unauthenticated Cross-Account Attacks 

| | Security Tips and Tricks
Amazon Web Services (AWS) has a shared responsibility model that brings new cybersecurity challenges to organizations and professionals learning how to manage cloud security. As your business grows and data increases, the complexity of managing so much information across teams… The post Detecting AWS Unauthenticated Cross-Account Attacks  appeared first on ... Read More

Cyber Kill Chain Steps and How to Defend Against APTs

| | Security Tips and Tricks
The Cyber Kill Chain® methodology was developed by the military defense firm, Lockheed Martin, to address cyberattacks by identifying the pattern and behavior of cybercriminals as they carry out an attack. These actions are referred to as cyber kill phases.[1]… The post Cyber Kill Chain Steps and How to Defend ... Read More
Automation LogRhythm Cloud graphic

Automation Use Cases Using LogRhythm.Tools

| | Security Tips and Tricks
LogRhythm.Tools is a PowerShell framework which acts as a wrapper for the LogRhythm API. This simplifies interactions with the LogRhythm API because you only need to run a PowerShell cmdlet to call an API function, rather than a direct interaction with your own… The post Automation Use Cases Using LogRhythm.Tools appeared first on ... Read More

Executive Order on Zero Trust — What it Means for Federal Agencies

| | Security Tips and Tricks
While Ronald Reagan was president during the height of the Cold War in the 1980s, he popularized an old Russian phrase that was translated as “trust, but verify.” Reagan invoked this phrase to emphasize the extensive verification procedures that would… The post Executive Order on Zero Trust — What it ... Read More

Keeping Up with U.S. Cybersecurity Regulatory Compliance Requirements

2021 has provided no shortage of security events and incidents. The increasing frequency and severity of supply chain and ransomware attacks have put pressure on governments and various regulators to act, which has created a lot of noise and uncertainty… The post Keeping Up with U.S. Cybersecurity Regulatory Compliance Requirements ... Read More
Introduction to MistNet NDR (Network Detection and Response) by LogRhythm

Combating Ransomware and APTs with MistNet NDR

| | Product News
“Greetings! Your company network has been hacked. All of your important files have been encrypted!” Last year NPR revealed that over 65,000 companies received a ransomware note like this, averaging seven attacks per hour. Unfortunately, things appear to be getting… The post Combating Ransomware and APTs with MistNet NDR appeared ... Read More
Postman welcome screen

6 Steps to Using the LogRhythm API

This article will show you how to use the LogRhythm API. It is important to understand what the API can do and how you can use it. This will help you gain better value from your SIEM deployment. A Practical Use… The post 6 Steps to Using the LogRhythm API appeared ... Read More
 LogRhythm Client Console view of AIE Rule

Integrating SIEM Within Compliance Programs

| | LogRhythm Labs
At their core, information security and compliance seem like topics that should go hand in hand: InfoSec deals with the daily functions of identifying and responding to threats, while compliance includes responsibilities of implementing IT security controls and effective governance.… The post Integrating SIEM Within Compliance Programs appeared first on ... Read More
Detail page

LogRhythm is a Nine-Time Gartner SIEM Magic Quadrant Leader

| | Uncategorized
LogRhythm was named a Leader in the 2021 Gartner Magic Quadrant for Security Information and Event Management (SIEM) report for the ninth consecutive time. Once again, we are incredibly honored by this distinction and believe it is a testament to… The post LogRhythm is a Nine-Time Gartner SIEM Magic Quadrant ... Read More
Loading...