Thumbnail cover image of research study called, "Making Security Priorities Business Priorities research study"

Aligning Security with Business Objectives

Aligning security with business objectives should be a top priority, but that is not always the case for many organizations. According to research, 93% of security leaders do not report to the CEO, yet 60% say they should to provide… The post Aligning Security with Business Objectives appeared first on ... Read More

Total Economic Impact™ Study Reveals 258% ROI for LogRhythm SIEM

| | Infosec News
Organizations seeking a platform to mature their security operations center (SOC) and reduce risk to the business must make monumental decisions when choosing a security solution. IT security leaders need to understand the benefits, costs, and risks associated with implementing… The post Total Economic Impact™ Study Reveals 258% ROI for ... Read More

Introducing Student LogWars — A LogRhythm EDU Partnership Program

| | Customers
In the cybersecurity industry, one of the biggest problems facing recent graduates and employers is the lack of real-world experience from education. To address these challenges, LogRhythm is excited to announce a new facet of our EDU Partnership Program, Student… The post Introducing Student LogWars — A LogRhythm EDU Partnership ... Read More

Improving Threat Detection Using LogRhythm SmartResponse with Lists to Monitor IOCs

As a security professional, you know all too well the need to continually improve your threat detection techniques and skill set. With today’s expanding attack surface and hackers becoming more sophisticated in their infiltration methods, building a stronger defense is… The post Improving Threat Detection Using LogRhythm SmartResponse with Lists ... Read More
AI Engine (AIE) event AIE: T1059:Command and Scripting Interpreter

Ransomware Detection and Mitigation Strategies in OT/ICS Environments

| | LogRhythm Labs
On 9 May 21, the Federal Bureau of Investigation (FBI) issued a statement regarding a network disruption at Colonial Pipeline, one of the largest fuel pipelines servicing the eastern United States. Following immediate operational shutdowns and further initial investigation, the… The post Ransomware Detection and Mitigation Strategies in OT/ICS Environments ... Read More
Zero Trust model free resources and templates

Four Steps to Building a Strong IT Partnership for Your Zero Trust Implementation

Implementing a Zero Trust model is becoming a leading security strategy for organizations across the globe, but it requires fundamental shifts in mindset and major transitions in the deployment, use, and management of security technologies. When mapping your Zero Trust… The post Four Steps to Building a Strong IT Partnership ... Read More
Introducing LogRhythm CloudAI

A Guided Threat Hunting Example with LogRhythm CloudAI

| | Uncategorized
Threat hunting is a great way to uncover cyberattacks or malicious activity within your environment, which would otherwise have gone undetected. This post outlines a guided example of a threat hunting process where we will be looking for evidence of… The post A Guided Threat Hunting Example with LogRhythm CloudAI ... Read More

Join LogRhythm at RSAC 2021

| | Uncategorized
RSA conference (RSAC) is quickly approaching from May 17–21, 2021, and we hope to see you there! RSAC is a great opportunity for you to learn more about security trends and best practices that can enhance your skills and knowledge,… The post Join LogRhythm at RSAC 2021 appeared first on ... Read More

LogRhythm’s Commitment to the Boulder Community

| | Life at LogRhythm
LogRhythm isn’t just headquartered in Boulder – we were founded in Boulder. Boulder is a unique and loving place, and we stand with the strong Boulder community in the aftermath of last month’s tragedy at a local supermarket. Our hearts… The post LogRhythm’s Commitment to the Boulder Community appeared first ... Read More
Detail page

Introducing LogRhythm 7.7: Improving the Analyst Experience with Detail Page and Timeline View

| | Product News
Security analysts are constantly challenged to investigate security incidents and mitigate them quickly. But does your security operations center (SOC) have the full picture of what’s occurring in the environment to remediate the impact of a false negative? LogRhythm is… The post Introducing LogRhythm 7.7: Improving the Analyst Experience with ... Read More