Discover the latest insights from the LogRhythm team on ThreatManagement.info

Discover the latest insights from the LogRhythm team on ThreatManagement.info

Recent highlights include a look at methods to protect your organisation against personal cloud applications chosen by employees and why cybersecurity technology must evolve with the threats.

For more articles and insights from the LogRhythm team, visit ThreatManagement.info.

Lewis Slaney - The power of User Entity Behaviour Analytics

Recently, I've been searching for a breach scenario where valid credentials or legitimate systems have been used in an unlawful way. I wanted to discuss the power of what user entity behaviour analytics can achieve. I stumbled across this article... Read more

Andrew Costis - Could 'case linkage' help with attribution and false flags?

Although 'case linkage' is a term used primarily in law enforcement, recent research presented at DefCon 26 in Las Vegas, brings this important concept to the surface for all security practitioners. Threat researchers and defenders alike have a... Read more

Lewis Slaney - Can your SOC run on autopilot?

Automation, in my opinion, is now, more than ever, a crucial component in keeping on top of the day-to-day tasks of a SOC. The volume and sophistication of threats are increasing daily, and all too often, I encounter analyst teams stuck in... Read more

Andrew Costis - No signs of slowdown for ICS attack efforts

What this article highlights is that while ICS attacks are typically believed to be mostly nation-state sponsored, the fact that a lone attacker was able to compromise the honeypot by installing backdoors and a toolset that allows RDP access into... Read more

Laura Reid - Why cybersecurity technology must evolve with the threats

Cyberthreats evolve. We know this. Just consider the recent rise of 'cryptojacking', which has taken over from ransomware as the most common type of cyberattack. And the cybersecurity industry is innovating to ensure there are products and... Read more

Andrew Costis - 5 ways to detect and prevent malicious personal cloud usage

Perhaps you already have good security practices in place for your chosen enterprise cloud applications used by your organisation, but how do you go about protecting against personal cloud applications chosen by your end users? Dropbox, Google... Read more

Laura Reid - You’re only as strong as your weakest link

Another week another security compromise – this time it was Ticketmaster UK, which saw customer information potentially compromised by an incident at a third-party supplier. A customer support product hosted by Inbenta Technologies was compromised... Read more

To view or add a comment, sign in

More articles by Natalie Pinner

Insights from the community

Others also viewed

Explore topics