Thoma Bravo-owned LogRhythm Announces Merger with Rival Exabeam 

Financial terms were not released but the price tag is expected to be hefty with Exabeam’s most recent valuation pegged at $2.5 billion.
The post Thoma Bravo-owned LogRhythm Announces Merger with Rival Exabeam  appeared first on SecurityWeek.
Continue reading Thoma Bravo-owned LogRhythm Announces Merger with Rival Exabeam 

Most companies changed their cybersecurity strategy in the past year

Businesses worldwide have faced a rate of change in the threat environment evidenced by 95% of companies reporting cybersecurity strategy adjustments within just the past year, according to LogRhythm. Strategic shifts within organizations At the heart … Continue reading Most companies changed their cybersecurity strategy in the past year

Infosec products of the month: April 2024

Here’s a look at the most interesting products from the past month, featuring releases from: Akamai, Bitdefender, CyberInt, Fastly, Forcepoint, IDnow, Immuta, Index Engines, Invicti Security, LogRhythm, Netwrix, Owl Cyber Defense Solutions, Privacera, … Continue reading Infosec products of the month: April 2024

LogRhythm Axon enhancements improve data management and operational efficiency

Recent global research reveals 61% of organizations still rely on manual and time-intensive methods for sharing security status updates. In response, LogRhythm announced its 8th consecutive quarterly release. The latest innovations to LogRhythm Axon fa… Continue reading LogRhythm Axon enhancements improve data management and operational efficiency

Insider threats can damage even the most secure organizations

Insider threats encompass both intentional and unintentional actions. Some insiders may maliciously exploit their access for personal gain, espionage, or sabotage, while others may inadvertently compromise security protocols due to negligence, lack of … Continue reading Insider threats can damage even the most secure organizations

How cybersecurity strategies adapt to evolving threats

Cybersecurity strategies are essential components of modern organizations, designed to protect digital assets, sensitive information, and overall business continuity from potential cyber threats. As technology advances, the complexity and frequency of … Continue reading How cybersecurity strategies adapt to evolving threats