Gartner Recognition: When it Rains, it Pours…

As a co-founder of Cequence, I get the pleasure of seeing firsthand how our products help our customers protect their APIs from malicious attacks that can lead to fraud and data loss. However, the challenge any small company has is getting the word out… Continue reading Gartner Recognition: When it Rains, it Pours…

Improving Threat Detection Using LogRhythm SmartResponse with Lists to Monitor IOCs

As a security professional, you know all too well the need to continually improve your threat detection knowledge and skill set. With today’s expanding attack surface and hackers becoming more sophisticated in their infiltration methods, building a str… Continue reading Improving Threat Detection Using LogRhythm SmartResponse with Lists to Monitor IOCs

LogRhythm Champions Profile: Seth Shestack

The LogRhythm Champions Network is an exclusive community of LogRhythm’s most passionate and strategic customers.  This elite group of customer leaders in the InfoSec community are experts in all things LogRhythm. The LogRhythm Champions Network works … Continue reading LogRhythm Champions Profile: Seth Shestack

Automate URL and File Blacklisting with Netskope and LogRhythm

While many organizations focus on outside threats, network security shouldn’t be neglected. Having greater visibility into the websites people are searching and the files they are downloading in your network should be a priority. To strengthen your net… Continue reading Automate URL and File Blacklisting with Netskope and LogRhythm

Solving the #1 API Security Challenge Enterprises Face – API Visibility

Research shows that the number one challenge most organizations have is that they do not know how many APIs they have – and that they cannot protect what they cannot see. API Sentinel helps them overcome this challenge by providing continuous visibilit… Continue reading Solving the #1 API Security Challenge Enterprises Face – API Visibility

How to Audit and Test for Sudo’s CVE-2021-3156 with LogRhythm

TL/DR Qualys has reported that Sudo, before 1.9.4p2, has a heap-based buffer overflow vulnerability that allows privileged escalation to root via “sudoedit -s” and a command-line argument that ends with a single backslash character. Detecting a success… Continue reading How to Audit and Test for Sudo’s CVE-2021-3156 with LogRhythm

Code42 and LogRhythm Partner to Protect Against Insider Threats

As remote work has become the norm for many enterprises, organizations are struggling with the troubling reality of rising insider threats. Whether the results are from careless or negligent employees or malicious insiders, it’s crucial to arm your org… Continue reading Code42 and LogRhythm Partner to Protect Against Insider Threats

Tales from the Front Lines: Retailer Prepares for Holiday Bot Battle in a Matter of Weeks

Following on the retail win posted previously, this week’s win is a clothing and home décor retailer that had an account takeover/credential validation challenge that their incumbent solution was unable to address. Bad actors were targeting APIs suppor… Continue reading Tales from the Front Lines: Retailer Prepares for Holiday Bot Battle in a Matter of Weeks

Tales from the Front Lines: Large Retailer Achieves Near Immediate Time-to-Value

One of our newest customers is a large, community-based retailer that had a mobile application and API account takeover problem. Roughly 12 months ago, they selected a JavaScript and SDK-based bot mitigation solution to address their ATO challenges. Th… Continue reading Tales from the Front Lines: Large Retailer Achieves Near Immediate Time-to-Value