Australia's leading source of security and threat news
These search results are from across the Techday network of sites
LogRhythm SIEM gets a boost with Webroot threat intelligence & IP reputation services
"Through our partnership, LogRhythm can provide its customers with proactive protection against modern threats," comments Webroot.
Security professionals waste 10 hours every week because of poor software
Cybersecurity professionals could be wasting as many as 10 hours per week on tasks because of software that isn’t fit for the purpose.
How to stop 'sleeper-agent' hackers from causing havoc
Organisations can no longer rely on prevention-centric strategies, rather, they have to be proactive.
LogRhythm launches GDPR compliance module as deadline draws near
LogRhythm has taken the plunge into the pre-GDPR market as businesses worldwide prepare their compliance strategies.
Whitepaper: What is cybercrime doing closer to home?
This new report from Frost & Sullivan delves into APAC's cybersecurity maturity and includes a country breakdown and advice moving forward.
LogRhythm, McAfee, Splunk & IBM round out Leaders in 2017 Gartner Magic Quadrant for SIEM
"They typically have relatively high market share and/or strong revenue growth, and have demonstrated positive customer feedback for effective SIEM."
The ultimate guide to building a security operations centre with limited resources
Operating without a SOC means your company could experience major delays in detecting and responding to incidents.
LogRhythm divulges eight key predictions for cybersecurity in 2018
The predictions for the new year include both good news and bad news, like the biggest data breach settlement of all time and increased awareness.
New cloud tech helps businesses avoid data breaches
The tech can automate an extensive range of tasks – including incident response, platform administration and, of course, threat detection.
Why machine learning is essential for cybersecurity
AI has been presented as a silver bullet for malware, but businesses struggle to implement it correctly.
AI could be the key to ending cybercrime
Over the last few years, the world has seen a steady and increasing flow of high profile data breaches hitting the headlines...
LogRhythm’s 15 year dream realised with revolutionary CloudAI launch
LogRhythm has taken another innovative step forward after reinventing the definition of SIEM by merging Cloud and AI together.
Attackers will get in: Three frameworks that help you through ransomware
We have to accept that attackers will get into our networks.
The definitive guide to identifying, qualifying, and responding to cyber threats
In order to minimise risk, organisations need to have a cybersecurity strategy that combines comprehensive visibility and advanced analytics.
Four crucial factors to consider when implementing a SIEM platform – Frost & Sullivan
A SIEM is the central nervous system for security analysts in combing through alerts, conducting investigations, devising countermeasures.
CASE STUDY: Achieving full network visibility with SIEM
Taking a look at how a rapidly growing business solved their network security woes with a LogRhythm SIEM solution.
LogRhythm celebrates bumper year of accolades for SIEM development
LogRhythm has cemented its pioneering space in the security sector this year, with accolades from the SANS Institute, Gartner and Forrester Wave.
Seagate appoints new APAC vice president of sales
Prior to Seagate, Yang oversaw sales in Asia and Japan for LogRhythm and headed the Asia Pacific sales channels at Hitachi Data Systems.
Practical ways your firm can take action with security analytics
Security is the word on everyone’s lips but what can you really do with the analytics data behind it? LogRhythm and SANS shows how to put it to work.
Not just a buzzword: Ebook reveals how global firms put security analytics to work
Security analytics has gone from buzzword to obligatory application in a very short time. Gartner, BT and the SANS Institute share their secrets.
Petya ransomworm's rapid spread: What the experts know right now
The Petya ransomware uses the EternalBlue exploit to not only infect files, but an entire system's drive. We get the latest from the experts.
The 2017-18 Budget: Here’s what Aussie’s cyber security vendors think
The Australian Budget dropped on Tuesday evening, and as per usual, there will be winners and losers - here is the POV from some top IT vendors.
LogRhythm launches partner program alongside security's biggest brands
LogRhythm has launched a Technology Alliance Partner Program and signed up the likes of Carbon Black, Cisco and Palo Alto Networks.
Fight malware by spotting the top eight indicators of threat traffic in your network
There are eight main indicators that can help detect compromised networks. Here's how you can catch threat traffic before it cripples your systems.