Discover the latest insights from the LogRhythm team on ThreatManagement.info
Recent highlights include a look at methods to protect your organisation against personal cloud applications chosen by employees and why cybersecurity technology must evolve with the threats.
For more articles and insights from the LogRhythm team, visit ThreatManagement.info.
Lewis Slaney - The power of User Entity Behaviour Analytics
Recently, I've been searching for a breach scenario where valid credentials or legitimate systems have been used in an unlawful way. I wanted to discuss the power of what user entity behaviour analytics can achieve. I stumbled across this article... Read more
Andrew Costis - Could 'case linkage' help with attribution and false flags?
Although 'case linkage' is a term used primarily in law enforcement, recent research presented at DefCon 26 in Las Vegas, brings this important concept to the surface for all security practitioners. Threat researchers and defenders alike have a... Read more
Lewis Slaney - Can your SOC run on autopilot?
Automation, in my opinion, is now, more than ever, a crucial component in keeping on top of the day-to-day tasks of a SOC. The volume and sophistication of threats are increasing daily, and all too often, I encounter analyst teams stuck in... Read more
Andrew Costis - No signs of slowdown for ICS attack efforts
What this article highlights is that while ICS attacks are typically believed to be mostly nation-state sponsored, the fact that a lone attacker was able to compromise the honeypot by installing backdoors and a toolset that allows RDP access into... Read more
Laura Reid - Why cybersecurity technology must evolve with the threats
Cyberthreats evolve. We know this. Just consider the recent rise of 'cryptojacking', which has taken over from ransomware as the most common type of cyberattack. And the cybersecurity industry is innovating to ensure there are products and... Read more
Andrew Costis - 5 ways to detect and prevent malicious personal cloud usage
Perhaps you already have good security practices in place for your chosen enterprise cloud applications used by your organisation, but how do you go about protecting against personal cloud applications chosen by your end users? Dropbox, Google... Read more
Laura Reid - You’re only as strong as your weakest link
Another week another security compromise – this time it was Ticketmaster UK, which saw customer information potentially compromised by an incident at a third-party supplier. A customer support product hosted by Inbenta Technologies was compromised... Read more