Please turn on your JavaScript for this page to function normally.
HNS
Exabeam introduces AI-driven LogRhythm Intelligence

Exabeam announced its first quarterly product release since merging with LogRhythm. The latest innovations provide global customers with increased flexibility to choose the …

Infosec products of the month
Infosec products of the month: July 2024

Here’s a look at the most interesting products from the past month, featuring releases from: AttackIQ, AuditBoard, Black Kite, BlueVoyant, Druva, GitGuardian, Invicti …

Infosec products of the week
New infosec products of the week: July 5, 2024

Here’s a look at the most interesting products from the past week, featuring releases from LogRhythm, NordVPN, Regula, and Scythe. LogRhythm’s enhancements boost analyst …

HNS
LogRhythm’s enhancements boost analyst efficiency

LogRhythm announced its 9th consecutive quarterly release. In the AI-ready world, LogRhythm empowers security teams with the highest integrity data in the security industry to …

strategy
Most companies changed their cybersecurity strategy in the past year

Businesses worldwide have faced a rate of change in the threat environment evidenced by 95% of companies reporting cybersecurity strategy adjustments within just the past …

Infosec products of the month
Infosec products of the month: April 2024

Here’s a look at the most interesting products from the past month, featuring releases from: Akamai, Bitdefender, CyberInt, Fastly, Forcepoint, IDnow, Immuta, Index Engines, …

Infosec products of the week
New infosec products of the week: April 5, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Fastly, LogRhythm, Owl Cyber Defense Solutions, and TrueMedia.org. Owl Talon 3 …

HNS
LogRhythm Axon enhancements improve data management and operational efficiency

Recent global research reveals 61% of organizations still rely on manual and time-intensive methods for sharing security status updates. In response, LogRhythm announced its …

insider threat
Insider threats can damage even the most secure organizations

Insider threats encompass both intentional and unintentional actions. Some insiders may maliciously exploit their access for personal gain, espionage, or sabotage, while …

puzzle
How cybersecurity strategies adapt to evolving threats

Cybersecurity strategies are essential components of modern organizations, designed to protect digital assets, sensitive information, and overall business continuity from …

HNS
LogRhythm collaborates with D3 Security to help security teams identify behavioral anomalies

LogRhythm announced its partnership with D3 Security. This partnership brings together LogRhythm Axon SIEM and D3 Smart SOAR’s incident enrichment and response …

lock
Strategies to overcome cybersecurity misconceptions

Many CISOs may believe their cybersecurity defenses are robust enough to repel any attack, but there are critical misconceptions they may be harboring. In this Help Net …

Don't miss

Cybersecurity news