searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

LogRhythm

Get our top stories in your inbox

Nothing personal: Training employees to identify a spear phishing attack

May 6, 2022

Phishing attacks began years ago as simple spam, designed to trick recipients into visiting sites and becoming customers. In the meantime, they have morphed into a worldwide …

LogRhythm and SecLytics offer cybersecurity solutions for Middle East organizations

January 25, 2022

LogRhythm has partnered with SecLytics to transform the security posture and streamline operations for security operations center (SOC) teams in the Middle East. LogRhythm and …

2022 and the threat landscape: The top 5 future cybersecurity challenges

December 6, 2021

Digital adoption has rapidly accelerated and as a result, the threat surface has also expanded. As we look ahead to 2022, there will be new and evolving cybersecurity …

Critical infrastructure IoT security: Going back to basics

October 6, 2021

In this interview with Help Net Security, James Carder, CSO & VP of Labs at LogRhythm, talks about critical infrastructure IoT security, the vulnerabilities that are …

Microsoft Power Apps data exposure: Prioritizing sensitive data with secure configuration settings

September 21, 2021

Security misconfigurations are one of the most common gaps hackers look to exploit. One bad configuration setting in a popular cloud platform can have far-reaching …

How to foster collaboration with the IT team for a successful zero trust implementation

August 16, 2021

The conversation surrounding deploying a zero trust strategy continues to gain importance following the announcement of President Biden’s recent Executive Order, which …

LogRhythm launches cybersecurity automation tools in Qatar

July 14, 2021

LogRhythm has released a new set of automation tools to allow organizations to rapidly comply with Qatar’s National Cybersecurity Framework. It provides insights into AI …

Only 7% of security leaders are reporting to the CEO

June 23, 2021

While 60% of organizations have experienced a cyberattack in the last two years and spend approximately $38 million on security activities, only 7% of security leaders are …

Chris Brazdziunas joins Securonix as Executive VP, Head of Product Engineering

May 27, 2021

Securonix announced that product engineering heavy hitter Chris Brazdziunas will join its team as Executive Vice President, Head of Product Engineering. Augmenting the …

LogRhythm NextGen SIEM Platform 7.7 offers enhanced detection and response capabilities

April 7, 2021

LogRhythm announced the launch of version 7.7 of the LogRhythm NextGen SIEM Platform. The update introduces new features designed to streamline the threat detection and …

Momentum Cyber announces firm promotions and team expansion

March 29, 2021

Momentum Cyber announced firm promotions, team expansion, and record firm performance and transaction velocity to kick off 2021. Promotions and team expansion Momentum Cyber …

Kroll acquires Redscan to expand cyber risk offering

March 26, 2021

Kroll announced that it has acquired Redscan, an cyber security services provider based in the United Kingdom. With the addition of Redscan and its extended detection and …

Posts navigation

1 2 3

Featured news

  • Python packages with malicious code expose secret AWS credentials
  • OT security: Helping under-resourced critical infrastructure organizations
  • How phishing attacks are becoming more sophisticated
Webinar: What’s trending in email security?

What's new

OT security: Helping under-resourced critical infrastructure organizations

How phishing attacks are becoming more sophisticated

Python packages with malicious code expose secret AWS credentials

Clearview fine: The unacceptable face of modern surveillance

Don't miss

Python packages with malicious code expose secret AWS credentials

OT security: Helping under-resourced critical infrastructure organizations

How phishing attacks are becoming more sophisticated

Clearview fine: The unacceptable face of modern surveillance

Cybercriminals use Azure Front Door in phishing attacks

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • OT security: Helping under-resourced critical infrastructure organizations
  • How to keep your NFTs safe from scammers
  • Is your organization ready for Internet Explorer retirement?
  • Attackers aren’t slowing down, here’s what researchers are seeing

(IN)SECURE Magazine ISSUE 71.5 (June 2022)

Several of the most pressing topics discussed during this year’s Conference included issues surrounding privacy and surveillance, the positive and negative impacts of machine learning and artificial intelligence, the nuances of risk and policy, and more.

Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise