Securing Web Applications with Comprehensive Threat Detection
Web applications are everywhere. In many ways, particularly in today’s world of remote work, they are the cornerstone of daily business operations. However, web apps are the most frequently attacked assets in an IT environment and present some of the greatest security challenges. So, how do you go about addressing the risk? Let’s explore the solutions.
Four Questions to Consider when Building a Security Platform
Cybersecurity is more complex than ever before. Threats grow increasingly sophisticated, with cybercriminals employing automation to scale up the number and frequency of their attacks. These attacks often unfold in phases over weeks making them harder to detect. At the same time, multiplex IT environments are making it tougher for companies to maintain organizational control of their networks.
Understanding Managed Detection and Response, and Choosing Your Provider
Learn how to make informed decisions on the best managed detection and response providers (MDR) and security outcomes to meet your goals.
SLOTHFULMEDIA Remote Access Trojan
At the start of October 2020, CISA released a report detailing a new RAT known as SLOTHFULMEDIA deployed by a sophisticated threat actor. The report contains some technical analysis and indicators of compromise.
Innovating for Outcomes with Customer Obsession as the Driver
As a SaaS-enabled cybersecurity company, we are always on the threat hunt and innovation trail. We thrive on delivering increasingly more value to our customers and elevating their Alert Logic experience. As Albert Einstein once wisely implored: “You can’t solve a...
Cloud Transformation is a Marathon, not a Sprint
We recently wrapped up our cloud transformation webinar series by discussing how maintaining security at the core of your transformation enables growth, scale, and expansion of your business. This post expands on that discussion, offering a look into the shift to...
What Is a Network IDS and Why Do You Need It?
Discover the importance of a network Intrusion Detection System (IDS) and how it can pinpoint and thwart suspicious traffic in your environment.
Keeping Up the Pace of Cloud Transformation
You’ve successfully migrated to the cloud: Now what? Welcome to the Cloud Modernization phase of your cloud transformation. It’s time to take what you’ve put in place and turn up the dial to get more out of it. Modernization is where you can set yourself apart from...
Securing Your Business in Changing Times and Ways of Working
The arms race between cybersecurity and cyber attacks is nothing new. Organizations have always tried to stay one step ahead of malicious agents looking to access and sabotage their company network. However, the threat landscape changed in the wake of the COVID-19...
The Importance of Security, Right Now: An MSP Perspective
It’s been a week since I attended the LinkedIn Live stream, “The Importance of Security, Right Now”, where I shared my views on cybersecurity from the viewpoint of a Managed Service Provider (MSP). As CTO at Timico, I speak to our customers on a daily basis about...
Jumping the Migration Hurdle
In the race to digital, you can unlock endless benefits with cloud transformation. But to do it effectively you need to ensure you understand every step of the cloud journey. You need to set yourself up to not only go through the...
Effective Security Communication
Cyber attacks have been increasing for almost three decades. Meanwhile, security is an essential part of the critical path for major initiatives like cloud migration and the success of a growing remote workforce. While press and analysts have increased awareness on...