Stop Trying to ‘Swim Upstream’ with Your Cybersecurity
Many companies insist on doing things the hard way with their cybersecurity efforts. They need to stop trying to swim upstream and get cybersecurity that just works.
Companies Need Cybersecurity That Just Works
Nobody wants to spend time and effort comparing specs and features of cybersecurity tools. There’s nothing exciting about getting a new firewall or endpoint security solution. Organizations need cybersecurity solutions that just work — like a refrigerator or microwave oven.
Data Privacy Day: You Get Out of Data Privacy What You Put In
As we recognize Data Privacy Day, both companies and individuals need to understand the importance of safeguarding privacy, as well as their own choices and responsibilities related to data privacy.
Why Cybersecurity Is Like Fixing a Leaking Pipe
Many organizations try to muddle through and handle their own cybersecurity, but the result is typically cybersecurity that costs more but is less effective than working with qualified cybersecurity experts.
Managing Cloud Migration Security
Onkar Birk, SVP, Product Strategy & Engineering for Alert Logic, takes a look at some of the challenges of managing cybersecurity while migrating to a hybrid or multi-cloud environment.
Somewhere Along the Way, the Market Forgot about Better Security Outcomes
Cybersecurity tools need expert skills and cybersecurity services need solid tools and platforms. In the end, though, cybersecurity is not a measure of tools or services–it’s a function of achieving the best security outcomes.
The Role of AI in Cybersecurity
There’s a lot of hype around artificial intelligence (AI). It seems like every technology and cybersecurity vendor these days is claiming to use AI in some way, shape, or form. AI is not a magical solution for every problem, but one area where AI — more specifically machine learning (ML) — can play an essential role is in cybersecurity operations.
Businesses Face Increased Risk as Windows 7 End-of-Life Quickly Approaches
Alert Logic found that 66% of the devices scanned at SMBs will be at increased risk once support for Windows 7 officially expires on January 14, 2020.
Streamline Cybersecurity with Alert Logic and AWS Security Hub
Organizations are overwhelmed with cybersecurity alerts and struggling to provide the context necessary to take action. AWS Security Hub and Alert Logic streamline the process and simplify cybersecurity for customers.
How to Prevent Fileless Malware Attacks
Malware is as old as computing itself. But as with all cyberthreats, it has evolved to be more effective and efficient. Fileless malware is one of the more pernicious threats to come along. In fact, it was identified as “the most common critical-severity cybersecurity threat to endpoints” for the first half of 2020.
65% of Port Vulnerabilities Target Just Three Ports
Our 2019 research shows that nearly two thirds of all attacks against TCP/IP ports tend to target just three of the more than 130,000 ports available.
NIST: From Cells to Cybersecurity
A look at the role of the National Institute of Standards and Technology (NIST) and the challenges organizations face trying to achieve and maintain compliance with the NIST Cybersecurity Framework guidelines.