Pushing the Boundaries of AI-Driven Security Operations

The post Pushing the Boundaries of AI-Driven Security Operations appeared first on LogRhythm. - Read more

A New Era for Vigilant CISOs

The post A New Era for Vigilant CISOs appeared first on LogRhythm. - Read more

Strategies to Safeguard the Finance Industry Against Deepfake Onslaught

With the rise of deepfake technology, the financial sector faces a new and growing threat landscape, as malicious actors exploit artificial intelligence (AI)-generated content...

CISO Panel: How Security Teams Are Evolving Their Strategies in 2024

The cybersecurity industry is experiencing significant shifts in 2024. LogRhythm’s State of the Security Team global research reveals a whopping 95% of organizations have...

5 New Features that Streamline Security and Compliance with LogRhythm Axon

The output of a security and information event management (SIEM) platform is only as good as the data that is feeding into it. “Garbage...

Expand Log Source Collection and Flexibility with LogRhythm 7.17

Behind every LogRhythm product release, our team puts customers at the very core. That’s part of our commitment to you every 90 days. In...

Benefits of JSON Log Source Collection for LogRhythm Customers

When it comes to log sources, LogRhythm recognizes there are limitless options. After all, more than 30,000 Softwares as a Service (SaaS) companies exist...

More Memory Safety for Let’s Encrypt: Deploying ntpd-rs

When we look at the general security posture of Let’s Encrypt, one of the things that worries us most is how much of the...

Let’s Encrypt Continues Partnership with Princeton to Bolster Internet Security

Let’s Encrypt is proud to have been partnering with the Center for Information Technology Policy team at Princeton University since 2018 to bolster defenses...

Takeaways from Tailscale’s Adoption of ARI

Since March 2023, Let’s Encrypt has been improving our resiliency and reliability via ACME Renewal Information (ARI). ARI makes it possible for our Subscribers...

Latest article

What the March 2026 Threat Technique Catalog update means for your AWS environment

The AWS Customer Incident Response Team (AWS CIRT) regularly encounters patterns that repeat across their engagements when helping customers respond to security...

New BlobPhish Attack Leverages Browser Blob Objects to Steal Users’ Login Credentials

A sophisticated, memory-resident phishing campaign called BlobPhish, active since October 2024, that exploits browser Blob URL APIs to silently steal credentials from Microsoft 365...

Medtronic Confirms Data Breach After ShinyHunters Claims

Medtronic confirms IT breach as ShinyHunters claims millions of records accesseda - Read more

Why AI agents are triggering a rethink of enterprise identity

The Computer Weekly Security Think Tank considers the intersection of AI and IAM. In this article, we look at the specific impacts of agentic...