The Significance of PwnKit to Insider Threats
The nature of the PwnKit vulnerability lends itself to certain insider threats, so it’s important to understand where it runs the risk of being abused.
Privilege Escalation, PwnKit, and Ways to Detect
Alert Logic examines the privilege escalation vulnerability dubbed PwnKit and the best way to detect this vulnerability class.
What is File Integrity Monitoring (FIM)?
File integrity monitoring (FIM) is a powerful tool for detecting cybersecurity incidents like malware, ransomware, and advanced persistent threats.
Fortifying Automated Response with In-House Threat Research
Learn more about Alert Logic MDR with Intelligent Response – fortified with threat intelligence based on in-house threat research.
Now, we’ll hone in the importance of threat intelligence – based on in-house research by our threat intel teams – that ultimately enables custom response actions and allows you to deploy automation where appropriate.
What Cybersecurity Concerns do Business and IT Leaders Share?
Discover the most common cybersecurity concerns and questions business and IT leaders have for their organizations.
Accelerating HITRUST CSF Certification with AWS
AWS makes HIPAA compliance easier with a secure, agile infrastructure, tools, and services to help accelerate the HITRUST CSF certification process.
Alert Logic MDR with Intelligent Response: Tackling the Next Frontier in Cybersecurity
Many organizations are struggling with the same basic challenges: small security teams, too many alerts to handle, and too few candidates qualified to fill open cybersecurity positions. All of this is elevating the need for automated detection and response solutions, with increased emphasis on response, as industry analysts foresee it being the next battleground for customers in the Managed Detection and Response market.
Human Expertise is Key to Intelligent Incident Response
It has long been said that security requires a three-pronged approach — people, process, and technology. This is especially true where incident response is concerned, and managed detection and response (MDR) services can help provide all of these elements. This blog discusses how the MDR market came about and how it has evolved over time. In 2022, response capabilities will be the key differentiator.
What is ISO 27001?
ISO 27001 helps ensure organizations meet compliance requirements but doesn’t mandate specific tools or practices. Learn how the certification works and can help your organization.
Create a Comprehensive Cybersecurity Automated Incident Response Plan Before You Need It
451 Research, a part of S&P Global Market Intelligence, released the report, Practical Requirements for Responding to Cyberthreats with MDR, where it addressed one of the biggest questions facing companies of all sizes: “What is a cybersecurity automated response plan, and do you need one?”
Log4j: The Evolution of Vulnerabilities to CVE-2021-45046
This blog post outlines the evolution of vulnerabilities to CVE-2021-45046 and what to expect in 2022.
How Alert Logic Responded to Log4j to Keep Customers Secure
This blog post outlines the actions taken by Alert Logic in response to Log4j to ensure our vulnerable and targeted customers remained secure.