Your Guide to Education Cybersecurity Compliance in Malaysia
In the digital age, where sensitive information flows seamlessly through the internet, cybersecurity has become a paramount concern for just about every industry around the globe. Educational institutions are no exception to this. In fact, the Microsoft Global Threat Tool… The post Your Guide to Education Cybersecurity Compliance in Malaysia ... Read More
Prevention & Cure: Countermeasures Against Healthcare Cyberattacks
A recent successful cyberattack on a large technology provider for hospitals and pharmacies in the US has left patients unable to obtain their medication. This attack is a reminder that healthcare cyberattacks are not stopping, and a successful attack will… The post Prevention & Cure: Countermeasures Against Healthcare Cyberattacks appeared ... Read More
LogRhythm Promotes Joanne Wong to Interim Chief Marketing Officer
A pioneer of LogRhythm’s Asia Pacific operations, Joanne Wong’s appointment reinforces LogRhythm’s commitment to employee advancement through strategic internal promotions SINGAPORE, 5 March 2024 – LogRhythm, the company helping security teams stop breaches by turning disconnected data and signals into… The post LogRhythm Promotes Joanne Wong to Interim Chief Marketing ... Read More
How Government Agencies Can Defend Against Exfiltration Tactics
In the wake of recent cyber attacks targeting governmental agencies, the need for robust cybersecurity measures has never been more pressing. Most recently, the hacking group R00tK1T has been in the spotlight for its sophisticated campaigns against the cybersecurity infrastructure… The post How Government Agencies Can Defend Against Exfiltration Tactics ... Read More
Detecting Volt Typhoon TTPs – Security Spotlight
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. Last week, the Cybersecurity and Infrastructure Security Agency (CISA) released a… The post Detecting Volt Typhoon TTPs – Security Spotlight appeared ... Read More
On-Prem SIEM vs. Cloud-Native SIEM: Which One Is Right for You?
Security information and event management (SIEM) solutions are essential for organizations of all sizes to monitor their environment for security threats. SIEM solutions gather and scrutinize security logs originating from diverse sources like firewalls, intrusion detection systems, and web servers.… The post On-Prem SIEM vs. Cloud-Native SIEM: Which One Is ... Read More
Remote Desktop Protocol Hijacking – Security Spotlight
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about Remote Desktop Protocol… The post Remote Desktop Protocol Hijacking – Security Spotlight appeared ... Read More
Disable Windows Event Logging – Security Spotlight
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about a technique attackers… The post Disable Windows Event Logging – Security Spotlight appeared ... Read More
Detecting Domain Name Abuse – Security Spotlight
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about a cool open-source… The post Detecting Domain Name Abuse – Security Spotlight appeared ... Read More
Log Ingestion 101: Which Logs Should You Be Bringing Into Your SIEM?
Security Information and Event Management (SIEM) tools are indispensable in an organization’s cybersecurity framework. SIEM tools collect, analyze, and correlate log data from various devices and applications across an organization to identify suspicious activities, enhance overall security posture, and ensure… The post Log Ingestion 101: Which Logs Should You Be ... Read More