Your Search returned 42 results from our White Paper Library

Logrhythm

Security

Using MITRE ATT&CK in Threat Hunting and Detection

This white paper introduces ATT&CK and related tools based on ATT&CK, it also discusses how to make practical use of ATT&CK with a focus on threat hunting and detection....

Logrhythm

Security

Security Operations Maturity Model

This white paper shows businesses how they can assess and improve the maturity of their security operations.

Logrhythm

Security

The Crucial Role of User and Entity Behaviour Analytics to Counter Cyber Attacks

This IDC infobrief discusses the important role that user and entity behaviour analytics plays in helping businesses to counter cyberattacks.

Logrhythm

Security

Budgeting for a Modern SIEM – A Guide to Managing Financial Risk

This eGuide seeks to educate SIEM buyers on how to mitigate the security and financial risks associated with business growth.

Logrhythm

Security

Assurity Elevates Security Maturity and Achieves Compliance with LogRhythm’s Embedded Orchestration and Automation

This case study examines how Assurity were able to mature their security and achieve compliance by using LogRhythm’s NextGen SIEM Platform.

Logrhythm

Security

Optimise the Efficiency of Your SOC with Built-In Playbooks

This video looks at how businesses can improve the efficiency of their security operations centre using LogRhythm’s NextGen SIEM platform.

Logrhythm%c2%aelogo securityintelligence color forlightbackgrounds hex

Security

2018 Cybersecurity: Perceptions and Practices

This report provides insights into the state of cybersecurity practices of 751 mid-large-sized organizations in the US, UK and Asia Pacific regions.

Logrhythm logo0126 150x150

Business Management

Employing Machine Learning in a Security Environment

Machine Learning and Artificial Intelligence are the latest buzzwords in cybersecurity spaces and security vendors are continuously looking to develop these capabilities...

Logrhythm logo0126 150x150

Business Management

Next-Generation Ransomware

This white paper looks at how ransomware is evolving and outlines the new strategies threat actors are using to target organisations.

Logrhythm logo

Security

Employing Machine Learning in a Security Environment

Machine Learning and Artificial Intelligence are the latest buzzwords in cybersecurity spaces and security vendors are continuously looking to develop these capabilities...

Previous1345

Recommended for You

New report: Lockdown and the IT department

Kathryn Cave looks at the big trends in global tech

How CIOs manage cloud lock-in

Mark Chillingworth on IT leadership

How assistive technologies are transforming the lives of disabled people

Nic Fearn on the technology that aims to drive positive change in the world

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generation needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Research

Our in-house analyst and editorial team create a range of insights for the global B2B technology community. These look at the latest IT trends and other zeitgeist topics.

images

Poll

Do you think your smartphone is making you a workaholic?