Cyber Security

Vendor Landscape: Security Information & Event Management (SIEM)

This Research Is Designed For: IT or Security managers who wish to implement a Security Information and Event Management (SIEM) solution at their organization. Organizations that want additional security and visibility into their network activity. Organizations under stringent compliance obligations. This Research Will Help You: Select an appropriate SIEM solution based on vendor research. Create […]

The APT Lifecycle and its Log Trail

Advanced Persistent Threats, or APTs, are a growing concern in the security industry. APTs differentiate themselves from other types of hacking activities by targeting a specific organization for a specific target, often extremely high pay-off data. APTs are “advanced” in that the attackers often write customized zero-day malware and exploits specific to their target organization. […]

Automation Suite for GPG 13 Compliance

Protective Monitoring for HMG ICT Systems provides a framework for treating risks to systems, and includes guidance for configuring and collecting ICT log information in order to provide an audit trail of security relevant events of interest. These guidelines were put in place to provide security administrators and other IT professionals with an audit trail […]

Surfacing Critical Cyber Threats Through Security Intelligence

The significant and successful cyber events of 2014 might well prove to be the cyber tipping point, where businesses and governments together finally acknowledge the fragility of their enterprises, the grave threat to national and economic security, and the need for executive-level oversight. The LogRhythm Security Intelligence Maturity Model offers a compelling framework to help […]

The Cyber Threat Risk – Oversight Guidance for CEOs and Boards

At the height of the critically important holiday shopping season in 2013, one of North America’s largest merchants suffered a major data breach. Cyber thieves surreptitiously compromised pointof-msale (POS) systems and stole the payment card data of 40 million customers, along with non-payment personal data of another 70 million customers. In terms of the amount […]

SANS “Top 20” Critical Controls for Effective Cyber Defense

This paper outlines how LogRhythm’s Security Intelligence Platform maps directly to each of the 20 Critical Security Controls. The LogRhythm Platform has been specifically designed to provide real-time, continuous monitoring at the log layer. LogRhythm collects, normalizes and analyzes all available log and machine data in real time. All data is immediately forwarded to the […]

Protective monitoring and the UK Public Services Network (PSN)

Conducting business and delivering services online has delivered great benefits but there are associated risks that customers and the public are increasingly becoming aware of. Malicious activity and successful attacks against organisations and government services have been well publicised, to the extent that they are non-longer news unless the impact has been significant. Obviously the […]

Financial conduct authority

LogRhythm’s integrated architecture has been specifically designed to provide real-time continuous, automated monitoring for the detection and prevention of both security and fraudulent related activity. LogRhythm goes beyond monitoring by allowing customers to automate actual remediation and other actions via SmartResponseTM plugins. This whitepaper contains an in-depth table which provides a summary of how LogRhythm […]

The Ransomware Threat

Is your organisation prepared for a ransomware attack? Successfully defending your organisation against such an attack takes preparation and an understanding of what to look for if an attack begins. This guide shares the expert knowledge that researchers at LogRhythm have gathered about how ransomware attacks begin, how they progress through your endpoints and network, […]

Favourites

  • Favorite list is empty.
FavoriteLoadingClear favorites

Your favorite posts saved to your browsers cookies. If you clear cookies also favorite posts will be deleted.