Latest resources from LogRhythm
Defeating threats through user data: Applying...
Learn how to detect and respond to threats faster by focusing on user activity and behaviour.
You're facing a constant barrage of threats, so...
Using MITRE ATT&CKâ„¢ in Threat Hunting and D...
MITRE ATT&CK â„¢ is an open framework and knowledge base of adversary tactics and techniques based on real-world observations. ATT&CK provides a co...
Threat Hunting 101: 8 Threat hunts you can do...
In this white paper, we will discuss the minimum toolset and data requirements you need for successful threat hunting. We will take into account th...