In the News

LogRhythm and our thought leaders are consistently recognized in articles from publications all around the world. Read more below.

Built in Colorado logo

100 Best Places to Work in Colorado 2019

December 12, 2018

Check out the top 100 tech companies to work for in Colorado this year…

Dark Reading logo

7 Common Breach Disclosure Mistakes

December 6, 2018

The flip side to sharing too much information is sharing too little. The point of notifying customers is to allow them to protect themselves, so share what you can in order to help…

Forbes logo

15 Traits Tech Leaders Are Looking For In New Team Members

December 5, 2018

In today’s rapidly evolving technology industry, there’s greater demand than ever for specialized skills and industry experience. But not every company is looking for the same abilities…

Ect New Network logo

Quora Looks for Answers in Wake of Massive Data Breach

December 5, 2018

The personal data of some 100 million people who have used Quora, a popular question and answer website, has been compromised, the company disclosed Monday…

IT World Canada logo

Breaking News: Hotel Hack of 500 Million Customers Over Four Years

November 30, 2018

Mariott Hotels this morning admitted encrypted and unencrypted personal information on 500 million customers who made reservations at one of its Starwood Hotels has been copied over four years from one of its databases…

CSO Online logo

A SWIFT Response to Threats: How the Global Financial Network Safeguards Itself Against Compromise and Theft

November 26, 2018

In the digital era, cyber-security is – or should be – a prime concern for Australian organisations of all stripes and sizes. The Australian Cyber Security Centre’s 2017 Threat Report notes the existence of thousands of adversaries…

Forbes logo

Overcoming A Cybersecurity Breach: 12 Tips For Young Tech Professionals

November 20, 2018

With regular news stories of companies falling victim to security breaches, it can be a scary time for new tech executives. As hackers get better at attacking company networks, tech teams need to look deeper into…

Forbes logo

Smart Strategies For Leveraging Gamification Within Your Business

November 15, 2018

Gamification has become a go-to tactic for engaging consumers and employees alike in recent years. By applying elements of typical gaming activities such as continuation streaks, point systems and rewards…

Security Brief Asia logo

Exclusive: Fileless malware driving uptake of behavioural analytics

November 12, 2018

Over the past year, a new form of malware has emerged that is able to more successfully evade traditional detection and defence techniques. As a result, it is seeing increased use by…

Denver Business Journal logo

CTA APEX Awards: James Carder is a CISO of the Year Finalist

November 8, 2018

As CISO of Boulder-based LogRhythm, James Carder designed and created a five-year road map for the company’s cybersecurity program. One milestone on that path was aligning with a “Zero Trust” model that requires…

eWeek logo

LogRhythm Advances NextGen SIEM Security Platform With SOAR Features

October 30, 2018

LogRhythm is adding case playbooks and enhanced response and security operations center metrics to its NextGen SIEM platform. Some organizations might think of Security Information and Event Management (SIEM) technology as…

Forbes logo

Three Steps to Solving Content Management Confusion

October 26, 2018

Today’s content management platforms make it easier for people to securely share ideas, collaborate and get work done better and faster. That’s the plan. But it doesn’t always succeed…

Dark Reading logo

12 Free, Ready-to-Use Security Tools

October 12, 2018

There’s no excuse for not knowing your exposure. These free tools can help you analyze what your company is up against and point ways to developing a more thorough security program…

Gov Tech Review logo

Industry Welcomes NSW Cyber Security Strategy

October 8, 2018

Representatives of the IT security sector have welcomed the newly announced NSW Government Cyber Security Strategy, and urged other states to follow NSW’s example with their own integrated strategies…

Techaeris logo

Some Experts Agree that Facebook Security is in Need of Some Serious Work

September 29, 2018

Facebook security wasn’t something most of us worried about just five years ago. Most users happily went about their Facebook lives and never thought twice about…

Singapore Business Review

MAS Intensifies Bout Against Cyberthreats for FIs

September 26, 2018

MAS proposed to make a slew of cybersecurity measures for financial institutions (FIs) into legally binding requirements…

CSO Online logo

Cryptojacking Instances in Australia are on the Rise

September 4, 2018

One weekend in February, prominent government websites from around the world began triggering alerts in users’ anti-virus. State government…

Data Breach Today Asia logo

Catching Attacks Early in the Kill Chain

August 23, 2018

Organizations need to detect security events early in the kill chain in order to deflect attackers, says Matthew Winter of LogRhythm…

Security Brief Asia logo

Exclusive: How AI and Quantum Computing are Changing Cybersecurity

August 21, 2018

The advancement of artificial intelligence (AI) and quantum computing technology have brought equal parts excitement and trepidation to the…

Lawyer Monthly logo

Your Thoughts: Dixons, Reddit and The Breach Boom

August 6, 2018

Week after week media outlets spout out news about large companies failing to disclose old breaches, suffering current security breaches or refusing to…

Enterprise Innovation logo

Singapore to Increase Cybersecurity Measures

August 3, 2018

Following the most serious breach of personal data in Singapore’s history, the Smart Nation and Digital Government Group (SNDGG), together with the Cyber Security Agency of Singapore (CSA), has completed a…

Information Age logo

Reddit Suffers a Major Breach

August 3, 2018

Social media site Reddit has admitted to suffering a data breach stemming from a hack last June but has refused to disclose its scale…

Kr ASIA logo

Understanding Digital Clues Key in Cyber Breaches: LogRhythm Exec

July 29, 2018

The advancement of artificial intelligence (AI) and quantum computing technology have brought equal parts excitement and trepidation to the…

Today logo

SingHealth Cyberattack Likely to be State-Sponsored; Medical Data a Goldmine for Hackers, Say Experts

July 20, 2018

The cyberattack on SingHealth is likely to have been state-sponsored, given the type of data that was taken and the amount of resources required to mount such a breach, cybersecurity experts said…..

SC Media logo

Singapore Responds Quickly to its Biggest Ever Cyber-attack

July 20, 2018

Singapore’s government health database has been hacked and the personal information of about 1.5 million people has been stolen, including that of Prime Minister Lee Hsien Loong….

Channel Asia Singapore logo

LogRhythm Strikes Distribution Deal with M.Tech Across Key Asian Markets

July 19, 2018

LogRhythm has signed an agreement with Singapore-based M.Tech for the distribution of its cyber security solutions across Asia Pacific…

Infosecurity Magazine logo

Ticketmaster Breach Part of Global Digital Skimming Campaign

July 16, 2018

The Ticketmaster UK ‘breach’ is far more extensive than at first thought — part of a single operation by a threat group affecting over 800 e-commerce sites around the globe, according to new intelligence….

Silicon logo

Timehop Admits Data Theft of 21 Million Users

July 9, 2018

Timehop has admitted it is at the centre of a large data breach after it reported that the data from 21 million users had been stolen on 4 July….

SC Media logo

Ticketmaster UK Customers Hit in Third-Party Breach

June 28, 2018

Ticketmaster UK is alerting its customers to a third-party security incident that may have compromised their information…

SC Media logo

Tesla Saboteur Trains Spotlight on Insider Threats

June 21, 2018

Tesla’s recent revelation that an employee turned saboteur messed with code and exfiltrated data underscores the continuing challenge and complexity of insider threats and the difficulty ferreting them out before they can do harm…

Security Week logo

5.9 Million Card Details Accessed in Dixons Carphone Hack

June 21, 2018

Dixons Carphone, a household name in the UK, announced (PDF) today that it is investigating “unauthorised access to certain data held by the company.”…

CSO Online logo

GDPR Compliance in a Nutshell

April 25, 2018

If your organization is like most, you may be freaking out about the upcoming General Data Protection Regulation (GDPR) enforcement date of May 25, 2018…

Security Brief Asia logo

Diving Into the Malware Abyss with LogRhythm's Erika Noerenberg

April 23, 2018

Reverse engineering malware is a job that’s never the same from one day to the next – much like the evolution of malware itself. Even when it’s malware from a variant that already exists…

The Wall Street Journal logo

Survey Roundup: Regulatory Inconsistencies Take Toll on Companies

April 19, 2018

A survey of 751 IT decision-makers in the U.S., U.K. and Asia-Pacific by security company LogRhythm found one-third said they spend 10% or less of their IT budget on security…

Infosecurity Magazine logo

Organizations Failing at Timely Detection of Threats

April 11, 2018

Detection and remediation capabilities still need work at most organizations. Less than half of all organizations in a benchmark survey from LogRhythm were able to detect…

Journal of Cyber Policy logo

IT Professionals Lack Confidence in Their Ability to Detect and Contain Cyberbreaches

April 10, 2018

LogRhythm has just released its annual benchmark survey, Cybersecurity: Perceptions & Practices, which measures cybersecurity perceptions and practices of organizations in the United States…

The New Paper logo

How much data does Facebook have on you?

April 9, 2018

The New Paper reporters downloaded archives of their personal data from the two companies and found, among other things…

Infosecurity Magazine logo

The Diversity Cybersecurity Needs

April 6, 2018

Read up on information security challenges in the cloud, GDPR’s dark side, securing CNI and millennials in the workforce…

Tech Wire Asia logo

3 cybersecurity threats to universities and how they could be addressed

April 5, 2018

Earlier this week, four major Singapore universities said they were victims of cyber attacks, highlighting the need for Southeast Asian tertiary institutions to ramp up preventative measures…

DNA logo

Cyberwarfare: Machine vs Machine

April 3, 2018

Consider Volvo’s self-driving cars, Apple’s Siri, OCBC’s illegal financing detection system, and the Maritime and Port Authority of Singapore’s Project SAFER – today we’ve been seeing more of artificial intelligence (AI) technology…

Security Brief Asia logo

Not quick enough

March 28, 2018

Organisations around the globe still face a tough fight against the cyber threat battle, with new research from LogRhythm showing that fewer than half of all organisations are able to detect a ‘major’ cybersecurity incident within one hour…

Tech Wire Asia logo

Are concerns about cybersecurity just talk?

March 27, 2018

Businesses understand the growing importance of protecting their company against cyber incidents such as network breaches, data thefts, and frauds. However, as hackers get more competent and find better tools to aid them in their malicious plans…

Software Magazine logo

Continuous Security

March 23, 2018

Today’s SIEM solutions offer threat detection and security incident response by analyzing SIM and SEM data in real time for internal and external threat management. By analyzing historical data from compliance reporting and incident investigation, SIEM solutions…

Networks Asia logo

The hype and reality surrounding AI and ML

March 13, 2018

Machine vs machine. That’s the future battleground in cybersecurity. It is a scary thought but the perception that hackers are just people sitting behind the computers is no longer true…

CSO Online logo

The challenge of nailing IT security in an OT World

February 26, 2018

The Internet of Things (IoT) might be a current hot topic in technology circles, yet linking electronic devices to improve efficiency and automate processes is not exactly a new concept…

Professional Security Magazine Online logo

Detect Threats

February 13, 2018

Ross Brewer, vice president and managing director EMEA, LogRhythm, covers how organisations can use User and Entity Behaviour Analytics (UEBA) to detect threats…

CSO Online logo

How to approach a Zero Trust security model for your enterprise

February 9, 2018

Implementing a Zero Trust model to protect your enterprise’s critical systems could be worth the trouble…

Security Brief Asia logo

LogRhythm dips toes into UEBA market to defend against user-based threats

February 5, 2018

LogRhythm is dipping its toes into the User and Behaviour Analytics (UEBA) market for organisations that aren’t able to replace their existing legacy solutions - and to protect against insider threats, account takeovers, as well as privilege abuse and misuse…

CSO Online logo

Nearly half of users still don’t know what ransomware is – but AI promises a workaround

February 5, 2018

With many users still clueless about the existence of ransomware and companies struggling to change their behaviour, artificial intelligence (AI) is rapidly gaining currency as a solution to user indifference and a driver for more proactive defences in the future…

Newsweek logo

Apple iPhone Chip Vulnerability is the 'Most Disturbing' Security Issue in Decades

January 5, 2018

Apple has admitted that every iPhone and Mac computer is affected by the Meltdown and Spectre chip vulnerabilities, which security researchers say…

minutehack logo

Microchip Meltdown as Experts Uncover Serious Flaws

January 5, 2018

A serious flaw reportedly present in all Intel’s CPUs made in the past 10 years is leaving devices vulnerable to hackers, security experts have warned…

Tech Wire Asia logo

2017: A watershed year for cybersecurity

December 27, 2017

Though we will come to characterize 2017 with many words and many concepts over the coming months, this year will probably be remembered as the year when warfare came to the cyber sphere in earnest…

Info Security Magazine logo

Security Pros Waste 40 Hours Per Month Thanks to Inefficient Systems

December 20, 2017

The majority of IT decision-makers think the average cybersecurity professional wastes as much as 10 hours a week due to inadequate software…

Computer Weekly logo

Cloud AI in the Enterprise: Making the Security Case

November 17, 2017

In this guest post, Ross Brewer, managing director and vice president for Europe, Middle East and Africa at cybersecurity software supplier LogRhythm, makes the enterprise case for using artificial intelligence (AI) in the fight against cybercrime…

Security Weekly logo

LogRhythm Unfurls AI Cloud Service to Enhance Security

October 20, 2017

Enterprise Security Weekly podcast covers the release of LogRhythm AI Cloud…

Comms Business logo

LogRhythm Deploy AI to Defeat Cyber Attacks

October 10, 2017

LogRhythm today introduced CloudAI a technology designed to help LogRhythm customers across the globe avoid damaging cyber incidents such as high-profile data breaches. CloudAI is an advanced cloud-based security analytics offering…

Dark Reading logo

Ransomware Numbers Continue to Look Abysmal

September 28, 2017

Ransomware is one of the fastest-growing concerns among IT pros, according to several studies out this week…

Dark Reading logo

7 SIEM Situations That Can Sack Security Teams

September 27, 2017

SIEMs are considered an important tool for incident response, yet a large swath of users find seven major problems when working with SIEMs…

Built in Colorado logo

At LogRhythm, people ride inner tubes to work — and help clients fight cyberattacks

September 25, 2017

Boulder-based LogRhythm is on a roll. Since its 2003 founding, the company has melded multiple technologies into a user-friendly platform that detects and responds to cyber threats and attacks…

SC Media logo

The Dark Overlord cybergang threatens kids in its latest attack

September 21, 2017

A cyber gang calling itself The Dark Overlord Solution late last week sent an unusually threatening ransom note to the Columbia Falls school district forcing officials to shutter its schools to ensure the safety of the students…

USA Today logo

How did the Equifax breach happen? Here are some answers and some questions.

September 14, 2017

Nearly half of all Americans are affected by a cyber security breach at Equifax, one of the nation’s three major credit-reporting agencies. Here’s how to avoid being a victim…

CSO logo

Hope is not a security strategy – which is why AI is no longer optional

September 8, 2017

Good information-security personnel have become harder and harder to find – and that is making it harder to mount an effective defence against ballooning volumes of security alerts…

The Denver Post logo

Clearing up confusion on the Equifax data breach, no thanks to Equifax

September 8, 2017

What the hack happened is unclear, but best to live like your personal data was stolen…

Built In Colorado logo

Why this security vet tapped a physicist to get LogRhythm off the ground

August 24, 2017

During the dot-com boom of the 90s, Chris Petersen could see that increased demand for cybersecurity was on the horizon. So, too, was the need for security analysts to detect and respond to threats rapidly…

CIO UK logo

Threat Lifecycle Management: The key to combatting sophisticated threats

August 15, 2017

In response to the shortcomings of prevention-centric security strategies and the challenges of securing an increasingly complex and open IT environment, many organizations should be shifting their resources and focusing towards strategies centered on threat detection and response…

eSecurity Planet logo

The importance of effective incident response: The HBO breach expands

August 9, 2017

The hackers behind the recent breach at HBO have posted additional stolen data online, including Game of Thrones script summaries and several emails from an HBO executive’s inbox, according to the Hollywood Reporter…

CEO Today logo

How can AI help us fight cyber crime?

August 8, 2017

How better to fight cybercrime than with today’s top cyber technology, AI; fighting fire with fire. Ross Brewer, Vice President and Managing Director at LogRhythm explains the ins and outs of artificial intelligence…

SC Media logo

£17 million fines for CNI companies under proposed EU SNIS plans

August 8, 2017

Under an (NIS) directive being adopted by the UK, CNI providers will face fines of £17 million or up to four percent of annual turnover if they fail to protect critical infrastructure from loss of services due to cyber-attacks…

SC Media logo

HBO breach accomplished with hard work by hacker, poor security practices by victim

August 8, 2017

Cybersecurity executives are speculating the HBO hack by “Mr. Smith” was the result of the intruder putting in a tremendous amount of effort to infiltrate the entertainment giant…

SC Media logo

HBO hacked: Game of Thrones, Ballers, Room 104 content involved

August 1, 2017

Entertainment Weekly reported that hackers claimed to have taken 1.5TB of data from HBO…

The Straits Times logo

Moving into a job in cyber security at 63

July 24, 2017

Madam Ivy Lim, who landed her new job in March, has lost no time in becoming software firm LogRhythm’s best-performing telesales employee in the region…

Business Reporter logo

A new approach to cyber security is required

July 17, 2017

Victims of damaging cyber breaches make the news every week – don’t become one of them…

CSO logo

Protecting critical infrastructure in an IoT world

July 14, 2017

Attacks on critical national infrastructure such as power grids, communication networks and the banking sector have massive implications for any country. Disruption to public services, hits to the economy and even loss of life are all potential scenarios…

Tech World logo

LogRhythm Clinches 2017 Frost & Sullivan Asia-Pacific Award

July 7, 2017

LogRhythm has clinched the 2017 Frost & Sullivan Asia-Pacific Enterprise Security Product Line Strategy Leadership Award…

SC Media logo

What breach? AA fails to alert customers after server leaks card data

July 4, 2017

Though the AA’s shop was reportedly leaking payment card data, the motoring association did not alert customers…

My Business logo

Businesses scramble amid new ransomware attack

June 28, 2017

Another devastating ransomware attack has caused havoc worldwide, with security experts again warning SMEs they are a primary target…

Silicon logo

LogRhythm: Cyber security offers strong careers for women in tech

June 28, 2017

Chris Brazdziunas, vice president of products at security intelligence company LogRhythum, discusses women in technology with Silicon…

Professional Security Magazine Online logo

Another ransomware attack

June 28, 2017

In late June another ransomware virus, named Petya, similar to the recent WannaCry attack, spread across the globe, affecting many countries…

Fox News logo

Petya ransomware: Experts tout 'vaccine' to protect computers from crippling cyber attack

June 28, 2017

Security experts say that a digital “vaccine” can protect individual computers from the crippling Petya ransomware…

Bdaily logo

British MPs' passwords leaked

June 26, 2017

Last week, it was revealed that two lists of stolen credentials had been put up for sale or were being traded on Russian-speaking hacking sites…

CSO logo

How security analytics can overcome monitoring bottleneck

June 20, 2017

As enterprise IT infrastructures become increasingly complex, reducing mean-time-to-detect and mean-time-to-respond metrics have become top priorities for every security team…

CIO logo

How to build a highly effective AI team

June 14, 2017

Four organizations share real-world insights into staffing a successful AI effort from the ground up…

Institution of Mechanical Engineers (IMechE) logo

GDPR: What industry needs to know to avoid hefty fines

June 9, 2017

Data protection is vital to any company’s trusted relationship with both customers and suppliers…

The Washington Post logo

How can you protect your right to digital privacy at the border?

June 8, 2017

For travelers, concerns about digital privacy are on the rise…

Baseline logo

University upgrades—and shares—security system

June 5, 2017

The University of Massachusetts implements a centralized network security system and offers it as a managed service to other schools and businesses…

eSecurity Planet logo

OneLogin password manager hacked

June 5, 2017

The identity and access management service OneLogin, which uses Amazon Web Services (AWS) to store customer data, recently announced that an attacker had…

CSO logo

Basic security hygiene blocked WannaCry – but a comprehensive defense needs more

June 5, 2017

It may have sent European businesses scrambling and the security community abuzz, but the WannaCry ransomware attack’s fizzling in the United States and Australia means its legacy will be…

CSO logo

Basic security hygiene blocked WannaCry – but a comprehensive defence needs more

June 2, 2017

It may have sent European businesses scrambling and the security community abuzz, but the WannaCry ransomware attack’s fizzling in the United States and Australia means its legacy will be mostly as a cautionary tale…

SC Media logo

China's controversial cybersecurity law goes into effect

June 2, 2017

China’s new cybersecurity law went into effect on June 1, subjecting companies to stringent data privacy and protection guidelines, even as key questions linger…

CNBC logo

China's new cybersecurity law takes effect today, and many are confused

June 1, 2017

China’s new cybersecurity law takes effect today, and experts are rattled about what it all means…

Yahoo Finanace logo

China's new cybersecurity law is rattling businesses — here's what's really happening

May 31, 2017

The law has been largely touted by Beijing as a milestone in data privacy regulations, but critics say authorities haven’t provided enough information about how the wide-reaching law will be implemented…

Infosecurity Magazine logo

GDPR: One year and counting

May 25, 2017

Today marks exactly 12 months until the European General Data Protection Regulation (GDPR) comes into effect. With just a year to go, it’s now imperative that…

TechNewsWorld logo

Cybersecurity dangerously lax at Mar-a-Lago

May 19, 2017

Internet security at Mar-a-Lago – the private club President Trump owns and has dubbed the “Southern White House” – is weak, ProPublica and Gizmodo reported Wednesday, based on their recent joint investigation…

Computer Weekly logo

WannaCry attack should spur ransomware and XP migration activity

May 15, 2017

The high profile global ransomware attack at the end of last week should get the phones ringing as customers turn to resellers for advice about security and getting off outdated operating systems…

IMechE logo

Experts urge manufacturers to update systems before next ransomware attacks

May 15, 2017

Security experts have urged manufacturing companies to rapidly update ageing control systems following the WannaCry cyber attack, as concerns remain that another attack is imminent…

GSN logo

Trump executive order draws praise from cybersecurity experts

May 12, 2017

President Donald Trump on Thursday signed a long-anticipated executive order calling for the federal government to ramp up its cybersecurity measures…

The Cyberwire logo

US Executive Order on cyber security

May 12, 2017

US President Trump yesterday signed his long-anticipated Executive Order on cyber security. Its sections address…

Channel Life logo

Exclusive: NSP taking LogRhythm SIEM to SMB market with security-as-a-service offering

April 26, 2017

Kiwi network and system integrator NSP is gearing up to launch a new security-as-a-service offering, taking LogRhythm’s security information and event management technology into the SMB market…

Security Brief Asia logo

LogRhythm report casts damning eye on enterprise security tactics

April 26, 2017

LogRhythm’s latest cyber resiliency report casts a damning look into the state of Asia Pacific organizations in Hong Kong, Australia, Singapore and Malaysia…

CSO logo

Cybersecurity industry braces for tighter visa rules

April 21, 2017

The current climate surrounding visas, immigrants and international travel will change the way some tech companies operate, and may harm US cybersecurity…

CSO logo

CSO Perspectives Roadshow interview

April 12, 2017

View the CSO Perspectives Roadshow interview between Bill Taylor, Vice President & General Manager APJ of LogRhythm and CSO’s Anthony Caruana…

Digital Guardian logo

Threat intelligence tips: monitoring, alerts, automation & more

April 3, 2017

18 security professionals share the most important sources of threat intelligence for security teams today…

CNBC logo

The Internet could be down for 24 hours this year

March 26, 2017

Andy Grolnick, president and CEO of LogRhythm, talks about his top cybersecurity predictions this year…

Dark Reading logo

Report: ‘OilRig' attacks expanding across industries, geographies

March 21, 2017

New research released by LogRhythm Labs offers details behind the malware campaign commonly referred to as OilRig…

Security Week logo

Travel agent association breach highlights supply chain threat

March 16, 2017

The Association of British Travel Agents (ABTA) today informed users of a breach that may have affected up to 43,000 customers…

SC Media logo

The role of the ICO in the GDPR

March 8, 2017

Norman Shaw looks at what the latest reports are signaling about the state of readiness for the GDPR, and the role of the ICO…

SDxCentral logo

LogRhythm’s platform thwarts threats by analyzing log data

March 8, 2017

Boulder, Colorado-based security company LogRhythm has developed a software platform that collects, organizes, manages, and analyzes millions to hundreds of millions of pieces of log data…

Helpnet Security logo

The six stages of a cyber attack lifecycle

March 6, 2017

In response to the shortcomings of prevention-centric security strategies, and the challenges of securing an increasingly complex IT environment, organizations…

Bank Info Security logo

Study user behavior to focus intrusion detection

March 3, 2017

Organizations have long sought to reduce their data breach detection time and increase their ability to mitigate breaches more quickly…

CSO logo

Global cybercrime prosecution a patchwork of alliances

March 1, 2017

One of the biggest issues is that unlike traditional bank robbers, who used to try to escape by driving their getaway cars across the state lines, modern cyber-crooks hide overseas…

Computer Weekly logo

How security approaches are evolving in Southeast Asia and beyond

February 8, 2017

Bill Smith, senior vice-president of worldwide field operations at LogRhythm, talks to Computer Weekly about the big shift in cyber security…

CIO Asia logo

Only 45 percent of APAC enterprises proactively conduct cyber risk assessments

February 7, 2017

A survey conducted by Frost & Sullivan polled 400 IT decision makers in Australia, Hong Kong, Malaysia, and Singapore to better understand the cyber resilience of organizations in the region…

Inc. logo

20 ways to attract good luck

January 30, 2017

Check out these quotes from a pile of executives who share their views on how anyone can be luckier…

Computer Weekly logo

UK firms struggling to manage cyber threats, survey shows

January 19, 2017

UK businesses are struggling to detect, prevent and respond to cyber threats, a survey of 2,000 IT professionals from companies of various sizes across 14 industry sectors has revealed…

Dark Reading logo

What to watch for with ransomware: 2017 edition

January 7, 2017

Ransomware will continue to evolve in 2017, bringing new and diverse threats to businesses. What changes are in store?

The San Diego Union Tribune logo

Soaring number of computers hijacked for ransom

January 6, 2017

The FBI said every hour, about 4,000 computers around the world become infected with ransomware. That’s just an estimate…

Business Insider logo

Prediction: The internet will shut down for 24 hours next year

December 21, 2016

It’s December, that time of the year when many industry experts make all sorts of predictions for the year ahead. But one prophecy caught Business Insider’s eye: The whole internet will shut down for 24 hours…

Dubai One logo

Interview with Dubai One TV

December 18, 2016

Mazen Dohaji, MENA Regional Director for LogRhythm, speaks about the impact of cybersecurity attacks on a global level…

The San Diego Union Tribune logo

Cheers and jeers for Obama's hard line against Russian hackers

December 16, 2016

President Barack Obama on Friday indicated that the United States will retaliate against Russia for hacking emails and other material from the Democratic National Committee and the Clinton campaign in an effort to help Donald Trump defeat Hillary Clinton in the presidential election…

eWEEK logo

IT professionals hold little back in reaction to Yahoo breach

December 16, 2016

The pioneering search and web services provider, whose home page starts more browser sessions than anybody in the world, revealed Dec. 14 that new security issues had impacted the personal data of more than 1 billion of its users…

Solutions Review logo

7 SIEM and security analytics vendors to watch in 2017

December 14, 2016

In 2017, IT organizations aren’t just fighting hackers and malware—they’re also battling a torrent of data from their own networks…

TechTarget logo

Building a threat intelligence program? How to avoid the 'feed' frenzy

December 1, 2016

Cyberthreat intelligence is just data if it is not actionable. We offer tips to help your team focus on relevant CTI for faster threat detection and response…

Network World logo

New products of the week 11.28.16

November 28, 2016

This latest version of LogRhythm’s security intelligence and analytics platform features more powerful machine analytics, embedded security automation and orchestration, and enhanced performance at scale…

The San Diego Union Tribune logo

How should Trump handle nation's cybersecurity problems?

November 28, 2016

Hackers are everywhere, causing ever more problems, leading many to ask: How should Donald Trump deal with cybersecurity when he becomes president on Jan. 20? It’s an issue he might have to address almost immediately…

Third Certainty logo

Machine learning underlying SIEM systems gets smarter at neutralizing cyber threats

November 23, 2016

ThirdCertainty recently spoke to LogRhythm co-founder and CTO, Chris Petersen, about the machine learning underlying SIEM detection capabilities…

The Denver Post logo

Is Windows 10’s built-in security good enough?

November 21, 2016

Built into the operating system is a program called Windows Defender. This is Windows’ version of anti-virus software that is geared toward not only protecting against dangerous files but also dangerous behaviors…

The Denver Post logo

Why Microsoft Outlook and other e-mail services know the motel you’re staying at

November 14, 2016

There are two types of companies in the world: Those that know they’ve been hacked and those that don’t. But in this case, there appears to be a third: people who use e-mail…

The Denver Post logo

When a cyber stranger wants $300 in iTunes gift cards to fix your PC, please question it

November 7, 2016

Let’s start with obvious: strangers — especially cyber strangers. Huge red flag when they demand money…

The Denver Post logo

Messing with telemarketers — just don’t do it, say security experts

October 31, 2016

Before taunting them, it’s important to note that they already have your phone number, name, and possibly other identifying information. This data could be used to cause real harm to you or your family, so it is ill-advised…

The San Diego Union Tribune logo

Analysts worry that last week's cyber attack was a 'trial run'

October 26, 2016

Security experts say that the big cyber attack that hit Twitter, Paypal, Netflix, Airbnb and dozens of other companies last week could be a precursor to a larger assault that deeply impacts American society, possibly during the holiday shopping season…

CSO logo

IoT, health and other data creates massive value

October 25, 2016

With about five billion IoT devices connected today, with growth expected to reach 25 to 38 billion over the next five years it’s clear something needs to be done to arrest the threat of billions of devices being recruited for nefarious purposes…

TIME logo

How Web Cams Helped Bring Down the Internet, Briefly

October 25, 2016

In a world where we increasingly live and work in giant webs of internet connectivity—our computers and phones, not to mention cameras, thermostats, garage door openers, kitchen appliances and baby monitors are all now connected to the web, often by default…

Yahoo Finance logo

LogRhythm Announces New Global Resale Partnership

October 25, 2016

LogRhythm today announced that it has formed a worldwide resale partnership with Dell EMC. This partnership reflects a long history of collaboration between the two companies, as LogRhythm is one of Dell EMC’s largest OEM customers… logo

StarLink adds security intelligence and analytics vendor

October 11, 2016

Security-specialised VAD StarLink, has signed a distribution agreement with LogRhythm, a global provider of security intelligence and analytics solutions…

CBR logo

IoT security – the next big cybersecurity issue has arrived

October 10, 2016

According to market watcher Gartner, there will be nearly 26 billion devices on the Internet of Things by 2020. It is also predicted that over 25 percent of identified attacks in enterprises will involve IoT…

TCF Newswire logo

LogRhythm to address Middle East's growing cybersecurity needs

October 6, 2016

LogRhythm is showcasing its Security Intelligence and Analytics Platform at this year’s installment of GITEX…

IBTimes logo

Yahoo hack: Could data breach scupper Verizon deal?

September 23, 2016

Yahoo’s admission that a “state-sponsored actor” successfully stole account information related to 500 million of users from its computer networks in late 2014 could have serious implications for the deal between the internet firm and its future parent company, Verizon…

The Washington Times logo

Yahoo confirms massive data breach; at least 500 million accounts affected

September 22, 2016

Yahoo officially revealed Thursday that the personal details of more than 500 million account holders were compromised as the result of a security breach being blamed by the company on government-hired hackers…

Misco logo

Majority of companies have experienced a hack in the last five years

September 21, 2016

In the last five years, the majority of businesses (92%) have experienced a data breach, new research by Lloyds of London reveals. Despite this, CEOs remain unconcerned about becoming the subject of another attack in the future, IT Pro reports…

IT Pro logo

Nine in ten companies hacked in last five years

September 20, 2016

Research by Lloyds of London has revealed that 92% of businesses have experienced a data breach in the last five years, yet CEOs are not concerned this could be a sign of things to come, expressing to the insurance market…

IT Wire logo

LogRhythm talks next-gen security, fighting ransomware and more

September 7, 2016

At the recent Gartner Security and Risk Management Summit, I caught up with the company’s CMO, Mike Regan, to talk about LogRhythm’s latest security solutions…

The Business Times logo

EDBI invests in US cybersecurity firm LogRhythm

August 31, 2016

EDBI, the investment arm of the Singapore Economic Development Board (EDB), has taken part in a US$50 million funding round into LogRhythm, a Colorado-based security intelligence and analytics firm…

Reuters logo

Cyber security firm LogRhythm raises $50 million after changing IPO plans

August 30, 2016

Cyber security company LogRhythm has raised $50 million from private investors after postponing plans for an initial public offering late last year, the company said on Tuesday, the latest sign of how austere the IPO market has become for some technology start-ups…

The Denver Post logo

LogRhythm’s user-friendly approach to cybersecurity attracts $50 million

August 30, 2016

Fast-growing LogRhythm is expected to announce Tuesday that it raised another $50 million from investors to speed up its global expansion to help large companies fight cyber attacks…

CSO logo

Why the death of SIEM has been greatly exaggerated

August 29, 2016

SIEM is not only alive and well, it’s also being put to work by small and mid-sized firms in increasing numbers. They are seeing value in the ability to proactively monitor their growing IT infrastructures and spot threats before they can cause disruption…

TechCrunch logo

How data science fights modern insider threats

August 25, 2016

Insider threats are the biggest cybersecurity threats to firms, organizations and government agencies. This is something you hear a lot at security conference keynotes and read about in data breach reports…

Network World logo

New products of the week 8.8.16

August 8, 2016

LogRhythm’s NetMon Freemium is featured by Network World as an intriguing new product…

Silicon Valley Watcher logo

Cybersecurity Costs - An Unsustainable Tax On Business

August 4, 2016

The cost of cybersecurity has become a burdensome tax on business and with 1.5 million IT security jobs unfilled, US corporations are losing to sophisticated criminal gangs, said security experts at a recent event in San Francisco…

Fox News logo

Wikileaks DNC email dump sparks malware fears

July 29, 2016

The trove of leaked Democratic National Committee emails posted to Wikileaks on July 22 has sparked concerns about malware as users access the vast trove of documents. WikiLeaks posted close to 20,000 emails and 8,000 attachments…

ZDNet logo

Cybersecurity is becoming an unsustainable tax on business

July 28, 2016

The annual costs of cybersecurity are doubling for some firms as huge data breaches force them to hire specialists and buy more software…

CIO logo

Doing business with Simon Howe of LogRhythm: Know thyself, empower your team

July 27, 2016

We’re focused on protecting against today’s rapidly evolving threat landscape which requires broad and deep visibility across the IT environment. LogRhythm provides profound visibility into threats and risks to which organisations are otherwise blind. Designed to help prevent breaches before they happen…

CNBC logo

2016 GOP platform endorsing strike-back against hackers

July 27, 2016

While the notion of hoisting cybercriminals upon their own petard is undeniably appealing, experts in the fields of security and technology told CNBC that “hacking back” is little more than a pipe dream…

Computer Business Review logo

Five steps to defend against a ransomware attack

July 11, 2016

Understanding what happens at each phase of a ransomware attack, and knowing the indicators of compromise [IOCs] to look for, increases the likelihood of being able to successfully defend against—or at least mitigate the effects of—an attack…

DNA logo

LogRhythm opens regional Hq in Singapore to build on momentum

July 6, 2016

Security intelligence and analytics company LogRhythm has announced the opening of its new Asia Pacific and Japan (APJ) headquarters in Singapore to support a growing demand for security intelligence solutions. LogRhythm opened its first office in Singapore in 2014 and has since expanded into Sydney, Melbourne, Hong Kong and Malaysia…

Security Management logo

Patient Zero

July 1, 2016

Ransomware had compromised the $5 billion health-care provider that operates 10 hospitals and more than 250 outpatient facilities in the Washington, D.C., region, serving thousands of patients and employing more than 30,000. While exact details were not released before Security Management’s press time, attackers hit MedStar on the morning of March 28, launching an attack that prevented certain users from logging in to its systems…

IT Pro Portal logo

Mitigating the insider threat to your business

June 25, 2016

This year, we have seen a steady flow of high profile data breaches hitting the headlines. Whether the result of unknown web vulnerabilities, DDOS attacks or overall lax corporate data security policies, data breaches are becoming an everyday occurrence. In fact, it is generally agreed that no organization is safe and that hackers will get in – but they can be stopped before they cause damage…

CSO logo

Next-generation SIEM turns low-level security monitoring for high-level business goals

June 16, 2016

Despite an initial rush to adopt security and information event management (SIEM) tools, complex implementations and a lack of skilled staff left many companies struggling to use SIEM effectively. That’s all set to change, however, as a new generation of SIEM tools…

CSO logo

Ransomware explosion is the latest security wakeup call for CxOs

June 16, 2016

The massive data breach of US retailer Target was a wakeup call for senior business executives too often disengaged with cybersecurity issues, but surging ransomware attacks are honing CxOs’ attention on the need for automated analytics tools to detect security breaches as they happen – rather than months later, or not at all…

The Straits Times logo

Not uncommon' to limit Internet access, say experts

June 11, 2016

Pulling the plug on Internet access on work computers is not uncommon in the private sector, say cyber-security experts and industry players, particularly in areas that deal with extra-sensitive information. These include the defence, financial and healthcare industries, but to varying degrees depending on the nature of the work employees do……

Channel NewsAsia logo

No Internet access for public officers’ work computers by next June

June 8, 2016

To guard against cyberattacks over the Internet and create a more secure working environment, the work computers of public officers will have no access to the Internet from next June. Channel NewsAsia speaks to Bill Taylor-Mountford who shares insights…

Bloomberg TV Malaysia logo

Malaysian Banks Not Immune to Cyber Threats

June 8, 2016

Cyber crimes cost the world up to half a trillion dollars a year and Malaysian banks are as much at risk as its global peers, says Bill Taylor-Mountford from security intelligence firm LogRhythm. He speaks to Bloomberg TV Malaysia’s Han Tan and shares how organizations in Malaysia can go beyond regulations and compliance to defend themselves against cyber threats…

Forbes logo

Cybersecurity Startups Set For Surge

June 7, 2016

Venture capital investment in cyberphysical security startups rose 78% to $228 million in 2015, and will rise to S400 million in 2016 as rapid adoption of the Internet of Things (IoT) raises the threat to products such as connected cars, smart homes and future factories, according to Lux Research…

Security Brief AU logo

Exclusive: New strategies to combat cyber attacks, from LogRhythm

May 31, 2016

Some SMEs are are paying lip service to cyber security, opening themselves up to being just another statistic in the malicious cyber crime game. That’s according to Bill Smith, LogRhythm Senior Vice President of Worldwide Field Operations and Bill Taylor, LogRhythm Vice President of Asia Pacific and Japan…

Built in Colorado logo

Before they were CEOs: what 4 Colorado tech leaders studied in college

May 24, 2016

We were curious how Colorado tech leaders got their start — from their childhood hopes to where they went to college — and it turns out, these four brought some pretty interesting lessons with them on their way to the top…

IT Pro Portal logo

GDPR gains EU approval: Industry reaction and analysis

April 15, 2016

Yesterday it was announced that the European Parliament officially approved the new Global Data Protection Regulations (GDPR), unifying Europe’s multiple data protection regulations into one common law…

The Register logo

Europe's new privacy safeguards are finally approved, must invade EU nations by 2018

April 14, 2016

The final seal of approval follows successful passage through the EU Parliament’s Committee on Civil Liberties, Justice and Home Affairs. Following four years of discussions and amendments, the GDPR is now officially EU law and will directly apply in all EU countries, replacing ageing EU and national data protection legislation…

Tech Week Europe logo

European Parliament Approves GDPR Data Protection Law

April 14, 2016

The European Parliament has officially approved the General Data Protection Regulation (GDPR) in Strasbourg, after more than four years of negotiations. The GDPR has been in the planning since January 2012, and it aims to give citizens back control over their data in the digital age, including the right to be forgotten. It also…

SC Media logo

European Parliament approves GDPR

April 14, 2016

After four years of work the much vaunted GDPR has been approved by the European Parliament, aiming to usher in a new age of data protection for European citizens and the companies that serve them…

eGov Innovation logo

CIO conversations II: A cyber cold war and two crucial steps towards national defense

April 7, 2016

Robert F Lentz continues: the reality of a cyber cold war, cyber-physical implications of the Internet of Things, baking security into systems at the earliest stages, and advice for developing economies when it comes to cyber-defense, including sharing how LogRhythm’s advanced data analytics engine is going to revolutionize the field and why it’s all about speed of detection and speed of response…

eGov Innovation logo

CIO conversations I: Cybersecurity lessons from the US military

April 7, 2016

Understanding security intelligence has never been more critical as disruptive technologies have not only changed the way companies operate and strategize, but have given rise to more sophisticated threats to the security of enterprise networks and data…

Tech Republic logo

LogRhythm mashes up security and big data to give SMBs better defense in one tool

April 6, 2016

Security Intelligence Management (SIM) can even the playing field between IT and cybersecurity attackers. Here’s how one of the leaders in the space offers a real-time battle strategy…

Healthcare Info Security logo

Ransomware: Time for a HIPAA Update?

March 29, 2016

The recent surge in ransomware attacks on hospitals has at least one member of Congress contemplating whether HIPAA’s breach notification requirements need to be clarified or updated to reflect the trend…

Healthcare Info Security logo

MedStar Shuts Systems After Cyberattack

March 29, 2016

A March 28 cyberattack that may have involved ransomware forced MedStar Health, a 10-hospital system serving Maryland and the Washington, D.C. area, to shut down many of its systems to avoid the spread of the malware…

IT Wire logo

Harnessing your inner SIEM

March 21, 2016

The buzzword in 2015 was cyber threat intelligence (CTI) - everyone wanted useful data and analytical tools for next-gen cyber security to detect and respond to threats faster. The industry responded by providing a plethora of CTI products. Matt Willems, a four-year Labs Engineer at LogRhythm, has written a good overview of CTI and SIEM…

Biz West logo

LogRhythm expanding Boulder presence to accommodate growth

March 16, 2016

Fast-growing cybersecurity firm LogRhythm Inc. is adding more real estate in Boulder, with another 50 employees expected to come onboard locally this year…

The Times logo

Former worker stole secret market data, Ofcom admits

March 11, 2016

The media regulator Ofcom has been forced to tell broadcasters that one of its former employees stole a considerable amount of confidential market information from its database and passed it on to his new employer…

City A.M. logo

An ex-Ofcom employee stole commercially sensitive data about the UK's major TV broadcasters – and then offered it to one of them

March 10, 2016

Ofcom has admitted that a former employee stole data from the regulator exposing commercially sensitive information about the UK’s biggest TV companies…

Help Net Security logo

UK businesses fail at security awareness

March 7, 2016

UK organizations are putting their reputation, customer trust and competitive advantage at greater risk by failing to provide their staff with effective security awareness and capability to defend against cyber attacks…

CNET logo

Not in my house: Amazon's unencrypted devices a sitting target, cybersecurity experts say

March 4, 2016

The news landed like a record scratch Thursday, when security industry heavyweights gathered at the RSA conference in San Francisco heard Amazon plans to stop protecting the data customers store on its tablets and other devices with a technology called encryption…

SC Media logo

Only 28% of cyber-attacks are reported by UK biz

March 4, 2016

Research from the Institute of Directors (IoD) and Barclays says that only 43 percent of the nearly 1,000 IoD members polled know where their data is physically stored. The research said, “This is a truly frightening statistic. It effectively means businesses are losing control of their organisation’s data which may well be the biggest asset of a business.” One fourth of the respondents…

ExecutiveBiz logo

Lockheed Martin adds LogRhythm to cybersecurity alliance

March 1, 2016

Lockheed Martin will work with LogRhythm on cybersecurity systems integration pilot programs after the latter signed up for the Lockheed Martin Cyber Security Alliance…

Lockheed Martin logo

LogRhythm joins Lockheed Martin cybersecurity alliance

February 29, 2016

Lockheed Martin (NYSE: LMT) announced the addition of LogRhythm, a leader in security intelligence and analytics, to the Lockheed Martin Cyber Security Alliance. Alliance members collaborate to solve growing cybersecurity needs and meet future threats through customer-focused solution design, experiments, and end-to-end systems integration pilots…

AP logo

Los Angeles hospital attack concerns cybersecurity experts

February 18, 2016

Cybersecurity experts worry that the $17,000 a Los Angeles hospital paid hackers to regain control of its computers could signal a troubling escalation of the growing ransomware threat…

DNA logo

Critical infrastructure: A clear and present danger

February 17, 2016

Critical infrastructure like power grids and water supplies has been the target of many theoretical cyber-attacks by academics and white hat hackers for years now, but with the recent shutdown of a power plant in Ukraine by hackers, this threat has now crossed from white-paper territory and into the real world…

IT Pro Portal logo

Massive web vulnerability puts devices at risk

February 17, 2016

A catastrophic flaw in one of the Internet’s core building blocks may bring a huge amount of apps and hardware devices vulnerable to attacks, according to researchers. A function performing domain-name lookups called getaddrinfo(), contains a buffer overflow bug that allows attackers to remotely execute malicious code. It can be exploited…

Computerworld Singapore logo

Cybersecurity in Asia: Keep your castle safe

January 25, 2016

When it comes to a cyber-attack, it is no longer a question of if your company will be hacked but when. Companies from 2 to 10,000 will get hacked. There’s no question. If you think that’s bad news, then consider this…

Biospectrum logo

Cybersecurity challenge for digitally connected healthcare

January 22, 2016

As technology drives a revolutionary transformation in the healthcare industry buoyed by the latest innovations in cloud computing, analytics, Internet of Things and other disruptive tech trends, healthcare service providers, including insurers, are rapidly becoming targets of cybercriminals. In fact, the cost of healthcare data breaches could reach $5.6 billion in 2015 according to Experian’s forecast…

WashingtonExec logo

NIAP Common Criteria Certification Awarded to LogRhythm’s v6.3.4 SIEM Platform

January 20, 2016

It was announced on January 12th by security intelligence company, LogRhythm that it has been granted the National Information Assurance Partnership (NIAP) Common Criteria Certification for its v6.3.4 SIEM platform…

TechBeacon logo

Takeaways from the latest Gartner Magic Quadrant for SIEM

January 20, 2016

With data breaches making news daily, organizations are looking for effective ways to protect their digital resources…

CSO logo

Which certifications matter most for those new to security

January 13, 2016

Certifications do matter, but an extensive list of certs with no hands-on learning to show that you can apply and utilize that knowledge won’t bode well in many interviews…

Network World logo

The Incident Response Fab Five

January 11, 2016

CISOs should consider and coordinate incident detection and response in five areas: hosts, networks, threat intelligence, user behavior monitoring, and process automation…

Electronic Health Reporter logo

Healthcare IT predictions for 2016

January 8, 2016

Guest post by James Carder, CISO of LogRhythm, VP of LogRhythm Labs…