Quantcast
Channel: LogRhythm: The Dialog - The Security Intelligence Company » zero day exploits
Browsing latest articles
Browse All 7 View Live

Image may be NSFW.
Clik here to view.

Hacker Summer Camp

This past week, I had the privilege of attending Black Hat, DEF CON, and BSides Las Vegas. I had a great time, met some incredibly talented people, gave a talk, learned a ton, and reconnected with old...

View Article



Protecting Against Zero Day Exploits Using Log Management and SIEM

The value of log management for things such as compliance or forensics-based insider threat detection is becoming increasingly recognized throughout the information technology world.  But some uses,...

View Article

Image may be NSFW.
Clik here to view.

NT & 2000. You’ll need more than a pocketful of posies…

Trust. The internet simply can’t afford it. I’m not talking about notional trust, or any form of technical trust. I’m talking about actual trust. Users of the internet can do without it. Why the...

View Article

Image may be NSFW.
Clik here to view.

FIM for Fonts: Using file integrity monitoring to protect against hidden threats

Almost everybody uses antivirus. Chances are that you have an antivirus running right now on the computer you are using to read this article. Antivirus is great – it gives us that warm, cozy, and...

View Article
Browsing latest articles
Browse All 7 View Live




Latest Images