Improving Threat Detection Using LogRhythm SmartResponse with Lists to Monitor IOCs

As a security professional, you know all too well the need to continually improve your threat detection knowledge and skill set. With today’s expanding attack surface and hackers becoming more sophisticated in their infiltration methods, building a str… Continue reading Improving Threat Detection Using LogRhythm SmartResponse with Lists to Monitor IOCs

Ransomware Detection and Mitigation Strategies in OT/ICS Environments

On 9 May 21, the Federal Bureau of Investigation (FBI) issued a statement regarding a network disruption at Colonial Pipeline, one of the largest fuel pipelines servicing the eastern United States. Following immediate operational shutdowns and further … Continue reading Ransomware Detection and Mitigation Strategies in OT/ICS Environments

Four Steps to Building a Strong IT Partnership for Your Zero Trust Implementation

Implementing a Zero Trust model is becoming a leading security strategy for organizations across the globe, but it requires fundamental shifts in mindset and major transitions in the deployment, use, and management of security technologies. When mappin… Continue reading Four Steps to Building a Strong IT Partnership for Your Zero Trust Implementation