Home / Blog / All Blog Posts

Alert Logic Blogs 

Managing Cloud Migration Security

Managing Cloud Migration Security

Onkar Birk, SVP, Product Strategy & Engineering for Alert Logic, takes a look at some of the challenges of managing cybersecurity while migrating to a hybrid or multi-cloud environment.

The Role of AI in Cybersecurity

The Role of AI in Cybersecurity

There’s a lot of hype around artificial intelligence (AI). It seems like every technology and cybersecurity vendor these days is claiming to use AI in some way, shape, or form. AI is not a magical solution for every problem, but one area where AI — more specifically machine learning (ML) — can play an essential role is in cybersecurity operations.

How to Prevent Fileless Malware Attacks

How to Prevent Fileless Malware Attacks

Malware is as old as computing itself. But as with all cyberthreats, it has evolved to be more effective and efficient. Fileless malware is one of the more pernicious threats to come along. In fact, it was identified as “the most common critical-severity cybersecurity threat to endpoints” for the first half of 2020.

NIST: From Cells to Cybersecurity

NIST: From Cells to Cybersecurity

A look at the role of the National Institute of Standards and Technology (NIST) and the challenges organizations face trying to achieve and maintain compliance with the NIST Cybersecurity Framework guidelines.

Cybersecurity in Retail

Cybersecurity in Retail

Martin Riley, Technical Director at Timico, shares his thoughts on cybersecurity in the retail industry and the fact that the very nature of ecommerce and retail networks exposes the organization to risk and invites the attacker inside.

What Is Endpoint Detection and Response?

What Is Endpoint Detection and Response?

Enterprise protection platforms (EPPs) are a foundational element of modern cybersecurity. These integrated solutions employ anti-malware to detect and block malicious exploits on devices at the edge of the organization’s network. While they’re largely successful in stopping traditional threats, they’re unable to protect endpoints from the more sophisticated threats that are increasingly targeting businesses.

Ready to Protect Your Company with Alert Logic?