LogRhythm
Follow
34 Followers
Follow LogRhythm on their other social channels!
About Us
Founded:
2003
Company Size:
501-1000 employees
Company Type:
Private
Location:
Boulder, CO
Website:
LogRhythm is a world leader in NextGen SIEM, empowering organizations on six continents to successfully reduce risk by rapidly detecting, responding to, and neutralizing damaging cyberthreats. The LogRhythm NextGen SIEM Platform combines user and entity behavior analytics (UEBA), network traffic, an ...
Read more
Promoted Content
Journey to the AI-Enabled SOC: Genesis
Follow
157
Customizing SmartResponse to Streamline Threat Hunting
Mature organizations often have an abundance of sources producing contextual data. LogRhythm SmartResponse is a great tool to help automate this influx of data, as well as take enforcement action on findings. Keep reading...
Follow
203
Journey to the AI-Enabled SOC: Advancing the Science of Threat Detection
Artificial Intelligence (AI)-enabled analytics offer great promise for furthering the science of advanced threat detection. While it is difficult to imagine AI superseding the cognitive and instinctive power of talented security analysts and threat hunters in the immediate future, AI can and will advance the science of threat detection to accelerate speed and accuracy, while reducing that bane of all security operations centers—false negatives and false positives. Keep reading...
Follow
177
Security Advisory: Meltdown and Spectre Vulnerabilities
Between January 3 and 4, 2018, three vulnerabilities in processor hardware were made public that affect nearly all modern architectures. Impacted architectures include Intel, AMD, and ARM. If successfully exploited, an unprivileged process on an affected system could read privileged memory inside other processes or, in some cases, outside guest containers or virtualization hypervisors.While no malicious attacks have been found, there is evidence that Proof of Concept (PoC) code is available and ...
Follow
307
7 Common CISO Pain Points and How to Overcome Them
Working in cybersecurity has its clear benefits: bringing value to a vital industry, competitive pay, and a thriving job market. With any job, however, there will always be some aspects that are less exciting than others.Here, I'll cover some of the less-glamorous elements of the CISO role that, while necessary, might leave some of us aching to throw on the headphones and just code—as well as some ideas on how to make these pain points less arduous.Keep reading...
Follow
223
8 Information Security Predictions for 2018
2017 has been another year full of front-page computer security events and incidents. Headlines have bulged with state-sponsored attacks, ransomware, leaks, and a continuing wave of data breaches. As we welcome 2018, we’ve not only reflected on the cyberattacks of this year, but we’ve also made some predictions as to what will happen in the world of Information Security in the coming months.Keep reading...
Follow
210
A CISO's Perspective
As the Vice President, Information Security Officer of Prologis, Sue Lapierre is responsible for developing and maintaining information security operations for the global industrial real estate company. Lapierre’s great responsibility is matched by an equally great enthusiasm for the cybersecurity space. “This is a hot industry right now,” Lapierre explains. “Cybersecurity is really the place to be.”Keep reading…
Follow
216
Security Monitoring for VMware Environments
Virtualizing an environment provides many advantages in the form of decreased operational costs, increased workforce efficiency, and an easier disaster recovery process. Unfortunately, a virtualized environment also significantly increases your risk and the possibility that intruders might compromise your network. Holistic monitoring of your organization’s virtual environment is critical to protecting admin privileges, machine backups, and critical infrastructure.Keep reading...
Follow
273
Using Deep Packet Analytics to Detect Packet Signatures
In September, we released LogRhythm NetMon 3.5.1, which had several updated DPA methods. These new methods greatly simplify the process of writing DPA rules and also offer new enhanced capabilities. The information in this blog applies to all NetMon releases from 3.5.1 or higher.Keep reading...
Follow
427
Phishing Intelligence Engine (PIE): Open-Source Release
We are pleased to announce the release of the LogRhythm Phishing Intelligence Engine (PIE), an integrated app within LogRhythm's Threat Lifecycle Management (TLM ) Platform.Keep reading...
Follow
455
SCADA Network Security Monitoring
With LogRhythm NetMon, you can analyze traffic flow between supervisory control and data acquisition (SCADA) systems, helping prevent major breaches of industrial control grids. As control platforms, SCADA systems are geographically spread across large distances and comprised of vast grids of pipelines.Keep Reading...

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel