Monitoring user logons outside business hours

Q3 2022 Analytic Co-Pilot Use Cases

LogRhythm leads with a customer-satisfaction approach in all that we do; that is one of the many reasons why we provide Analytic Co-Pilot Services. Our team works diligently to help customers improve security maturity through the implementation, use, and optimization… The post Q3 2022 Analytic Co-Pilot Use Cases appeared first ... Read More
Former LogRhythm NDR UI

Ease the Analyst Workflow with LogRhythm NDR

| | General, Product News
It’s easy to get lost in all the noise when trying to surface and make sense of potential threats to your organization’s network. Keeping your environment safe is a constant struggle with bad actors continuously looking for new ways to… The post Ease the Analyst Workflow with LogRhythm NDR appeared ... Read More
Threat Hunting Follina (CVE-2022-30190): Microsoft Office Zero-Day Exploit

Detecting Follina (CVE-2022-30190): Microsoft Office Zero-Day Exploit

| | LogRhythm Labs
Follina (CVE-2022-30190) is a Microsoft Office zero-day vulnerability that has recently been discovered. It’s a high-severity vulnerability that hackers can leverage for remote code execution (RCE) attacks. To help you prevent a damaging breach, LogRhythm Labs provides insight into the… The post Detecting Follina (CVE-2022-30190): Microsoft Office Zero-Day Exploit appeared ... Read More
PCAP Download Icon in the Incident Details Page.

Protecting Your Network with LogRhythm NDR

| | General
Protecting the network is an ongoing challenge for many cybersecurity professionals. At LogRhythm, our goal is to make it easier for you to detect and respond to network security threats quickly and effectively. We are pleased to announce the latest… The post Protecting Your Network with LogRhythm NDR appeared first ... Read More
Monitoring deleted and disabled user accounts

Analytic Co-Pilot Security Use Cases

| | General
LogRhythm’s Analytic Co-Pilot Services help customers accelerate threat detection and response by guiding users through the implementation and optimization of security analytics content and custom security use cases. While working closely with customers in Q2, 2022, the Analytic Co-Pilot team… The post Analytic Co-Pilot Security Use Cases appeared first on ... Read More
Event Log Filtering helps use case prioritization.

Introducing LogRhythm Version 7.9: Simplify Your Job with Greater Efficiency and Enhanced Security

| | Product News
As part of our commitment to customers, we’re continuing to innovate and invest in the LogRhythm SIEM Platform. Since 2003, LogRhythm has been an ally in cybersecurity, helping reduce customers’ cyber risk, eliminate blind spots, and quickly shut down attacks.… The post Introducing LogRhythm Version 7.9: Simplify Your Job with ... Read More

Leverage Your SIEM as Part of Your Zero Trust Strategy

Editor’s Note: This a partnered sponsored guest blog written by Avertium. Continuous monitoring is one of the most important facets of any Zero Trust architecture. The level of trust a system has in any user, application, or data flow may… The post Leverage Your SIEM as Part of Your Zero ... Read More
LogRhythm UEBA integration with LogRhythm SIEM

Detect Insider Threats with Cloud Native LogRhythm UEBA

| | General
The cyberthreat landscape has become more sophisticated due to the volume and complexity of attacks. That’s why it’s harder than ever to detect employees’ anomalous behavior or compromised accounts. As your security operations center (SOC) becomes more mature and you… The post Detect Insider Threats with Cloud Native LogRhythm UEBA ... Read More

Implementing the OMB 21-31 Memorandum

The Russia–Ukraine conflict has significantly intensified the cyberthreat landscape. As state-sponsored threat actors collaborate with financially-motivated cybercriminals to launch targeted cyberattacks against critical infrastructures, the cyberthreat landscape has become a free-for-all arena. As a result, the FBI and the Cybersecurity… The post Implementing the OMB 21-31 Memorandum appeared first on ... Read More
LogRhythm NDR Demo | See How Network Detection and Response Works

A Guide to EDR, NDR, XDR, and SIEM

As the ever-increasing list of cybersecurity acronyms and vernacular grows, what cybersecurity tools are truly best for your team and meet your organization’s needs? To make sense of it all, let’s dive into security technologies used in the market today… The post A Guide to EDR, NDR, XDR, and SIEM ... Read More