Learning from the Colonial Pipeline Hack: Better Protection through MDR
Like most ransomware attacks, the Colonial Pipeline attack was a well-known risk in the cybersecurity industry and purchased through a ransomware-as-a-service on the dark web. Although unfortunate, it highlights to organizations, big and small, the importance of not just being prepared to react after an attack, but to take the appropriate steps before an attack to prevent it from ever occurring.
AWS Container Security Best Practices
Learn all about common container security mistakes and best practices, all from the insightful perspectives of an AWS insider and an MDR expert. These insights can aid you on your path to securing your AWS containers.
Top 3 Myths and Best Practices of Cloud Migration Strategy
When it comes to cloud migration, you’ve likely come across endless articles and blogs showcasing dozens of tips and tricks on establishing an effective cloud migration strategy. In this blog, we’ve done the heavy lifting and distilled the list down to the top three myths to avoid falling victim to and top three best practices to adopt in your cloud migration journey.
How to Build an AWS Security Strategy That Works
There’s no denying the benefits of cloud applications and services. Companies of all sizes turn to Amazon Web Services (AWS) to drive innovation, maximize value, and achieve their business goals. But if you don’t understand the role you play in AWS SaaS security, you could be leaving yourself vulnerable to cyberattacks that undermine those benefits.
Celebrating Excellence in the Fight for Security
The Cybersecurity Excellence Awards may not get the ratings the Oscars receive, but perhaps they should. They honor the companies, products, and professionals that demonstrate excellence, innovation, and leadership in information security.
Avoiding Common Cloud Migration Mistakes
If you’re not in the cloud yet, you’re looking for ways to get there. It’s an inevitable conclusion for most organizations looking to scale and grow their business, but it’s not always as easy as it sounds. Overcoming barriers early on and avoiding common mistakes can be the difference between a successful and disastrous cloud migration strategy.
What is Cloud Security?
Cloud computing has become an essential strategy for organizations looking to increase the flexibility and scalability of their operations, reduce their on-premises footprint, or minimize the cost of running complex IT infrastructures. However, while cloud workloads can in general be more secure than legacy systems, they are still subject to threats from inside and outside of the organization.
Microsoft Exchange Attack: How Alert Logic Identified and Responded to the HAFNIUM hack
On the heels of the infamous breaches earlier this year, another breach dominates the headlines, the HAFNIUM led attack that affects on-prem versions of Microsoft Exchange. Fortunately, Microsoft has been aggressively moving customers from on-prem Office and Exchange to O365 and Exchange online. However, with every technology transition (much like public cloud adoption) each organization moves at their own pace.
What is Private Cloud?
Learn about the private cloud, its benefits and drawbacks, and how it may be a better choice for your organization.
What is Public Cloud?
Discover what a public cloud is, how it works, and its key benefits in this insightful blog from Alert Logic. Learn about security considerations, cost efficiency, and scalability in public cloud computing.
A Team That’s Built to Last
As an unprecedented winter storm wreaked havoc across Texas, the Alert Logic SOC stepped up to the plate to make sure that our customers never went unprotected for a single moment.
The Top 5 Cybersecurity Threats to Watch Out for in 2022
An unprecedented number of new challenges to cybersecurity were created in 2020 as the COVID-19 pandemic forced an unprecedented number of businesses out of the office to operate strictly online. This fueled a fertile environment for malicious actors to seek profit and sow chaos.