LogRhythm
Exabeam introduces AI-driven LogRhythm Intelligence
Exabeam announced its first quarterly product release since merging with LogRhythm. The latest innovations provide global customers with increased flexibility to choose the …
Infosec products of the month: July 2024
Here’s a look at the most interesting products from the past month, featuring releases from: AttackIQ, AuditBoard, Black Kite, BlueVoyant, Druva, GitGuardian, Invicti …
New infosec products of the week: July 5, 2024
Here’s a look at the most interesting products from the past week, featuring releases from LogRhythm, NordVPN, Regula, and Scythe. LogRhythm’s enhancements boost analyst …
LogRhythm’s enhancements boost analyst efficiency
LogRhythm announced its 9th consecutive quarterly release. In the AI-ready world, LogRhythm empowers security teams with the highest integrity data in the security industry to …
Most companies changed their cybersecurity strategy in the past year
Businesses worldwide have faced a rate of change in the threat environment evidenced by 95% of companies reporting cybersecurity strategy adjustments within just the past …
Infosec products of the month: April 2024
Here’s a look at the most interesting products from the past month, featuring releases from: Akamai, Bitdefender, CyberInt, Fastly, Forcepoint, IDnow, Immuta, Index Engines, …
New infosec products of the week: April 5, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Fastly, LogRhythm, Owl Cyber Defense Solutions, and TrueMedia.org. Owl Talon 3 …
LogRhythm Axon enhancements improve data management and operational efficiency
Recent global research reveals 61% of organizations still rely on manual and time-intensive methods for sharing security status updates. In response, LogRhythm announced its …
Insider threats can damage even the most secure organizations
Insider threats encompass both intentional and unintentional actions. Some insiders may maliciously exploit their access for personal gain, espionage, or sabotage, while …
How cybersecurity strategies adapt to evolving threats
Cybersecurity strategies are essential components of modern organizations, designed to protect digital assets, sensitive information, and overall business continuity from …
LogRhythm collaborates with D3 Security to help security teams identify behavioral anomalies
LogRhythm announced its partnership with D3 Security. This partnership brings together LogRhythm Axon SIEM and D3 Smart SOAR’s incident enrichment and response …
Strategies to overcome cybersecurity misconceptions
Many CISOs may believe their cybersecurity defenses are robust enough to repel any attack, but there are critical misconceptions they may be harboring. In this Help Net …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments