Home / Blog / All Blog Posts

Alert Logic Blogs 

Alert Logic MDR with Intelligent Response: Tackling the Next Frontier in Cybersecurity

Alert Logic MDR with Intelligent Response: Tackling the Next Frontier in Cybersecurity

Many organizations are struggling with the same basic challenges: small security teams, too many alerts to handle, and too few candidates qualified to fill open cybersecurity positions. All of this is elevating the need for automated detection and response solutions, with increased emphasis on response, as industry analysts foresee it being the next battleground for customers in the Managed Detection and Response market.  

Human Expertise is Key to Intelligent Incident Response

Human Expertise is Key to Intelligent Incident Response

It has long been said that security requires a three-pronged approach — people, process, and technology. This is especially true where incident response is concerned, and managed detection and response (MDR) services can help provide all of these elements. This blog discusses how the MDR market came about and how it has evolved over time. In 2022, response capabilities will be the key differentiator.

What is ISO 27001?

What is ISO 27001?

ISO 27001 helps ensure organizations meet compliance requirements but doesn’t mandate specific tools or practices. Learn how the certification works and can help your organization.

Demystifying Ransomware Detection Coverage Along the Kill Chain

Demystifying Ransomware Detection Coverage Along the Kill Chain

Ransomware creators are organized, global, and opportunistic. They operate much like enterprises with service desks and attack kits and take advantage of every opportunity, like the pandemic, to exploit weaknesses and vulnerabilities. There is no apparent end to their creativity — the latest attack types, in fact, hide within legitimate processes, making them very difficult to detect.

What is DevSecOps?

What is DevSecOps?

Applications drive business operations. Most organizations have developers who create and deploy software. For companies that develop software, securing their products and proving security is a way to build customer trust. However, threat actors increasingly target these applications because developers may not always be security professionals. For example, according to research, 56% of the largest incidents in the past five years can be traced to web application security issues. Organizations with development teams should understand what DevSecOps is and how to implement it.

Changing the Game: Hunting Ransomware with Threat Intelligence

Changing the Game: Hunting Ransomware with Threat Intelligence

In this blog, we’ll examine the typical progression of ransomware, how it has changed (and continues to change), and how advanced threat intelligence is necessary in order to be proactive in detecting and responding to such attacks.  

What Is GDPR Compliance?

What Is GDPR Compliance?

In this post, we take a close look at important sections of the GDPR and how they relate to your cybersecurity strategy. 

Ready to Protect Your Company with Alert Logic?