The Attacker Playbook Hasn’t Changed
Businesses still are challenged to address cybersecurity for remote workers, but for attackers, it’s just another day and business as usual.
IT and Security Teams Adjust to New Normal of COVID-19 Quarantine
The third in a series of posts looking at the impact of the COVID-19 quarantine on technology, productivity, cybersecurity, and the threat landscape, and how tips for coping with the new normal.
The Benefits of Giving Up a Little Control over Cybersecurity
The COVID-19 pandemic and shutdown of businesses has forced families to embrace new processes. There are lessons in the Coronavirus quarantine for businesses in terms of giving up control to achieve desired outcomes.
Attackers Prey on Chaos and Confusion of COVID-19
Attackers like to prey on chaos and confusion and use current events as a lure to catch victims. The COVID-19 pandemic is a prime opportunity for attackers to up their game.
Addressing COVID-19 Cybersecurity Challenges with Tips from NASA
We are all facing a challenging and unprecedented situation with the response to the COVID-19 pandemic. Here are some tips to help employees manage their productivity and cybersecurity as they work remotely from home.
3 Business Reasons Why You Shouldn’t Be Slashing Security Right Now
Some companies are cutting back on security in response to the COVID-19 pandemic and its affect on the economy, but there are sound business reasons why security should not be the first thing to be reduced.
Top Docker Security Vulnerabilities, Best Practices, & Insights
Docker is one the most popular container runtime engine in use. But being the most popular comes at a price. It also means Docker vulnerabilities are exploited more frequently, as attackers attempt to gain access to important information and/or resources.
Is your Docker security strategy up to par? Learn how you can keep your system protected against hackers.
Defining Required Capabilities for Managed Detection and Response
Managed detection and response (MDR) is gaining momentum, but there is confusion about what it actually is. The MDR Manifesto was created to provide a definition and foundation for the basic capabilities MDR should provide.
Managed Detection and Response (MDR) vs. Best of Breed
Explore the pros and cons of Managed Detection and Response (MDR) versus a best-of-breed approach in cybersecurity. Learn how MDR can streamline security management, reduce complexity, and enhance protection for modern threat landscapes.
We’re All in This Together: Reflections on the 2020 RSA Conference
Ryan Berg shares his thoughts and reflections from the 2020 RSA Security Conference.
Managing Cybersecurity with the Coronavirus Response and Sudden Spike in Remote Workers
Companies around the world have suddenly had to shift to an entirely remote workforce in response to the COVID-19 pandemic. The spike in work from home activity also expands the attack surfaces and poses an increase cybersecurity risk.
Alert Logic COVID-19 Preparedness and Response
Alert Logic CEO Bob Lyons explains the steps the company is taking to be prudent in helping fight the spread of COVID-19 and the actions taken to protect employees and the community while maintaining our commitment to keep customers secure.