Employee Service Provider Personal Group Deploys LogRhythm SIEM to Proactively Fight Cybersecurity Threats

| | General, Infosec News
Personal Group gains a streamlined cybersecurity solution to protect mission-critical and personal data against cyberattacks. LogRhythm, the company helping busy and lean security operations teams save the day, has been selected by Personal Group, a leading UK provider of employee… The post Employee Service Provider Personal Group Deploys LogRhythm SIEM ... Read More
Detecting the Follina Exploit (CVE-2022-30190) | Security Spotlight

Boost Your Threat Hunting with 12 Weeks of Security Spotlights

Chief security information officers (CISOs) are on the frontline when it comes to arming their security team against the ever-evolving threat landscape. As part of our commitment to empower security teams to navigate new and emerging cyberthreats, we are delivering… The post Boost Your Threat Hunting with 12 Weeks of ... Read More

Global Fintech Company Deploys LogRhythm’s SIEM to Minimize Cybersecurity Risk and Maximize ROI

| | General
A global fintech company needed a way to drive greater efficiency into its cybersecurity posture by achieving measurable time and cost savings. As the threat landscape continues to grow for the financial services industry, it needed to find the right… The post Global Fintech Company Deploys LogRhythm’s SIEM to Minimize ... Read More
Hoaxshell Reverse Shell | Security Spotlight

Introducing Security Spotlights

Gain the Cybersecurity Insights Needed to Reduce Noise, Prioritize Work and Quickly Secure Your Environment. Your cybersecurity needs are constantly changing as cybersecurity threats continue to evolve and increase in complexity. At LogRhythm, we are always looking to make it… The post Introducing Security Spotlights appeared first on LogRhythm ... Read More

Cyberattacks Are the Most Cited Risk to the UK Financial System

| | General
The latest research from The Bank of England has revealed that 74% of financial institutions declared that a cyberattack was amongst the top risks they thought would have the greatest impact on the UK financial system if they were to… The post Cyberattacks Are the Most Cited Risk to the ... Read More

Detecting and Monitoring Abnormal Login Activity with a Deterministic Rule-Based Approach

| | Analytic Co-Pilot
Most organisations focus their threat detection and prevention strategies on external actors, but internal threats can cause just as much harm. These threats are not always launched by malicious employees with intentions of inflicting damage, instead they can be caused… The post Detecting and Monitoring Abnormal Login Activity with a ... Read More