LogRhythm integrates with Gigamon to help security teams detect anomalies across their networks

LogRhythm announced its technology integration with Gigamon to help organizations around the globe increase visibility and protect against modern cyberattacks. By understanding the power and necessity of visibility, Gigamon and LogRhythm have integrate… Continue reading LogRhythm integrates with Gigamon to help security teams detect anomalies across their networks

New infosec products of the week: October 7, 2022

Here’s a look at the most interesting products from the past week, featuring releases from HashiCorp, Legit Security, LiveAction, LogRhythm, Pentest People, and Verica. Pentest People SecurePortal 2.0 enables users to identify vulnerabilities as they a… Continue reading New infosec products of the week: October 7, 2022

7 metrics to measure the effectiveness of your security operations

Given inflation and economic uncertainty, the cybersecurity industry is starting to experience budget cuts, despite a surge in ransomware attacks. As more budgets are going under the microscope, and in some cases, on the chopping block, one of the best… Continue reading 7 metrics to measure the effectiveness of your security operations

Infosec products of the month: July 2022

Here’s a look at the most interesting products from the past month, featuring releases from: Action1, Aqua Security, Cato Networks, CertiK, CoSoSys, CyberArk, Darktrace, Deloitte, EnGenius, Flashpoint, Fusion Risk Management, G-Core Labs, Kingston Digi… Continue reading Infosec products of the month: July 2022

LogRhythm platform enhancements accelerate threat response for security teams

LogRhythm launched version 7.9 of the LogRhythm SIEM Platform and updates to LogRhythm NDR and LogRhythm UEBA. “LogRhythm arms security teams with intelligent analytics and automated responses to reduce cybersecurity exposure, eliminate blind spots and… Continue reading LogRhythm platform enhancements accelerate threat response for security teams

Nothing personal: Training employees to identify a spear phishing attack

Phishing attacks began years ago as simple spam, designed to trick recipients into visiting sites and becoming customers. In the meantime, they have morphed into a worldwide criminal industry. In recent years, threat actors have refined their methods o… Continue reading Nothing personal: Training employees to identify a spear phishing attack