Please turn on your JavaScript for this page to function normally.
HNS
LogRhythm and Novacoast join forces to identify and counteract malicious actors

LogRhythm announced its partnership with Novacoast, a cybersecurity, identity and access company specializing in managed security, engineering, development, and advisory …

HNS
LogRhythm and Cimcor collaborate to enhance cyberattack protection for organizations

LogRhythm and Cimcor have joined forces to help organizations around the globe increase visibility and protect against modern cyberattacks. This partnership leverages …

HNS
LogRhythm integrates with Mimecast to defend users against email-based threats

LogRhythm and Mimecast’s integration will help organizations around the globe protect against modern cyberattacks. Organizations need the ability to correlate data from their …

Handshake
LogRhythm and Zscaler integration streamlines website access control

LogRhythm and Zscaler work together to help organizations around the globe increase network insight and address a variety of cloud access security challenges faced by the …

security platform
LogRhythm releases new cybersecurity capabilities to improve operational efficiency

For a fourth consecutive quarter, LogRhythm releases new cybersecurity capabilities that makes it easier for security teams to reduce noise, prioritize work and quickly secure …

Handshake
LogRhythm and Trend Micro help organizations defend their critical assets

Together, LogRhythm and Trend Micro are empowering security teams to confidently navigate a changing threat landscape and quickly secure their environments. The combined …

security platform
LogRhythm platform enhancements enable analysts to detect threats

LogRhythm has unveiled a series of expanded capabilities and integrations for its security operations solutions. The updates propel LogRhythm’s ability to be a force …

insider threat
3 major threat detection methods explained

The importance of threat detection cannot be overstated. A recent Verizon study revealed that the top discovery method (more than 50%) for breaches is in fact disclosure by …

working
Security is no longer an internal affair

67% of respondents to a recent survey indicated their company had lost a business deal due to the customer’s lack of confidence in their security strategy. Dimensional …

hole
Insights into insider threats: Detecting and monitoring abnormal user activity

A cyber security risk that comes from within an organization is referred to as an insider threat. Insider threats might be carried out purposefully or accidentally. Whatever …

Infosec products of the month: October 2022

Here’s a look at the most interesting products from the past month, featuring releases from: ABBYY, ARMO, Array, AuditBoard, AwareGO, Code42, Corelight, Digi International, …

Handshake
LogRhythm integrates with Gigamon to help security teams detect anomalies across their networks

LogRhythm announced its technology integration with Gigamon to help organizations around the globe increase visibility and protect against modern cyberattacks. By …

Don't miss

Cybersecurity news