LogRhythm integrates with Mimecast to defend users against email-based threats

LogRhythm and Mimecast’s integration will help organizations around the globe protect against modern cyberattacks. Organizations need the ability to correlate data from their disparate security products and services to distinguish the real threats from… Continue reading LogRhythm integrates with Mimecast to defend users against email-based threats

LogRhythm and Zscaler integration streamlines website access control

LogRhythm and Zscaler work together to help organizations around the globe increase network insight and address a variety of cloud access security challenges faced by the modern SOC. LogRhythm SIEM and the Zscaler Zero Trust Exchange platform provide v… Continue reading LogRhythm and Zscaler integration streamlines website access control

LogRhythm releases new cybersecurity capabilities to improve operational efficiency

For a fourth consecutive quarter, LogRhythm releases new cybersecurity capabilities that makes it easier for security teams to reduce noise, prioritize work and quickly secure their environments. Analysts gain a simplified experience to focus on detect… Continue reading LogRhythm releases new cybersecurity capabilities to improve operational efficiency

LogRhythm and Trend Micro help organizations defend their critical assets

Together, LogRhythm and Trend Micro are empowering security teams to confidently navigate a changing threat landscape and quickly secure their environments. The combined solution allows security teams to pull threat data from multiple sources, correlat… Continue reading LogRhythm and Trend Micro help organizations defend their critical assets

3 major threat detection methods explained

The importance of threat detection cannot be overstated. A recent Verizon study revealed that the top discovery method (more than 50%) for breaches is in fact disclosure by the threat actor themselves after a successful compromise. As attacks continue … Continue reading 3 major threat detection methods explained

Insights into insider threats: Detecting and monitoring abnormal user activity

A cyber security risk that comes from within an organization is referred to as an insider threat. Insider threats might be carried out purposefully or accidentally. Whatever the motivation, compromised enterprise systems are the ultimate results. In th… Continue reading Insights into insider threats: Detecting and monitoring abnormal user activity

Infosec products of the month: October 2022

Here’s a look at the most interesting products from the past month, featuring releases from: ABBYY, ARMO, Array, AuditBoard, AwareGO, Code42, Corelight, Digi International, EnigmaSoft, Exabeam, HashiCorp, Illusive, Kasten by Veeam, Legit Security, Live… Continue reading Infosec products of the month: October 2022

LogRhythm integrates with Gigamon to help security teams detect anomalies across their networks

LogRhythm announced its technology integration with Gigamon to help organizations around the globe increase visibility and protect against modern cyberattacks. By understanding the power and necessity of visibility, Gigamon and LogRhythm have integrate… Continue reading LogRhythm integrates with Gigamon to help security teams detect anomalies across their networks