Asia's leading source of security and threat news
These search results are from across the Techday network of sites
Exclusive: Fileless malware driving uptake of behavioural analytics
Fileless malware often finds its way into organisations via web browsers (or in combination with other vectors such as infected USB drives).
LogRhythm reports higher-than-anticipated SOAR adoption rate
The company’s embedded security orchestration, automation and response (SOAR) capabilities are embedded in its security information and event management offering.
Exclusive: How AI and quantum computing are changing cybersecurity
New technologies have a way of impacting existing industries in unexpected ways.
Bringing a gun to a gunfight: Countering AI-enabled threats
Artificial intelligence can reduce human effort and lower the time needed to detect, respond to, and recover from cybersecurity incidents.
A quick guide to machine learning in cybersecurity
Beyond the numbers and the terminology, there is a simple question: What does machine learning do for cybersecurity, anyway?
Intelligent cybersecurity systems - before it's too late
With all of the benefits that machine learning brings to any cybersecurity analytics system, can you really afford not to make that step?
Look before you leap: How to select the best SIEM for your business
You don’t have to venture far into cybersecurity solutions to come across the word ‘SIEM’, or Security Information and Event Management.
Has SIEM met its match with today’s cyberthreats or is there life in it yet?
In its early stages SIEM was a trailblazer but now there are many that say it can't keep up with today's cybercrime - LogRhythm says different.
Taking a look at what makes up a modern SIEM solution
SIEM has evolved from a complex and unwieldy beast to a smart, big data-driven and powerful solution that can be used by organisations of any size.
LogRhythm promotes from within for APAC sales director role
Simon Howe, who served as A/NZ director of sales, has taken up the role.
RepKnight adds dark web monitoring to top 3 SIEM vendors
RepKnight has announced the integration of its BreachAlert dark web monitoring platform with Splunk, IBM QRadar, and LogRhythm.
Effective security needs a balance of both humans and robots
Robots give security analysts more time to get up to speed on the latest threats and improve their technical skills.
5 IT vendors weigh in on budget announcement
Leaders from Ricoh Australia, WatchGuard Technologies, 8x8, LogRhythm, and Snowflake Computing give us their view on the recent budget.
LogRhythm & Mimecast fuse email security & next-gen SIEM
Joint customers are now able to access LogRhythm’s advanced correlation and security analytics through email security data from Mimecast’s cloud.
Interview: Diving Into the malware abyss with LogRhythm's Erika Noerenberg
SecurityBrief talked with LogRhythm senior malware analyst Erika Noerenberg about vulnerability exploitation, malware, and the Internet of Things.
IT decision makers unsure about their security maturity
Respondents in APAC put forth highest IT budget allocation to security, but overall executives allocate security less than 10% of their budget.
Carbon Black launches tech partner program to improve collective security defences
Carbon Black has launched a new technology partner program that is designed to improve cybersecurity through collective defence.
Not quick enough: Most firms can't detect or contain a breach within one hour
Fewer than half of all organisations are able to detect a ‘major’ cybersecurity incident within one hour.
NZ company launches new security service tailored to NZ businesses
The managed service from Advantage provides enterprise-class products from a number of major vendors that would usually be unaffordable for SMBs.
LogRhythm dips toes into UEBA market to defend against user-based threats
“UEBA arms organisations to detect and respond to user-based threats. Analysts are provided evidence-based starting points for investigation."
LogRhythm SIEM gets a boost with Webroot threat intelligence & IP reputation services
"Through our partnership, LogRhythm can provide its customers with proactive protection against modern threats," comments Webroot.
Security professionals waste 10 hours every week because of poor software
Cybersecurity professionals could be wasting as many as 10 hours per week on tasks because of software that isn’t fit for the purpose.
How to stop 'sleeper-agent' hackers from causing havoc
Organisations can no longer rely on prevention-centric strategies, rather, they have to be proactive.
LogRhythm launches GDPR compliance module as deadline draws near
LogRhythm has taken the plunge into the pre-GDPR market as businesses worldwide prepare their compliance strategies.