The Road to AWS re:Inforce 2019 – Predictions with Our CMO
The first of a 3-part series of vlogs focused on the inaugural AWS re:Inforce cybersecurity conference coming up June 25-26.
State of GDPR Compliance and Cybersecurity After First Year
A look at the first year of the General Data Protection Regulation (GDPR)–it’s impact on data privacy and cybersecurity and the current state of compliance as we begin year two.
Critical Vulnerability in WordPress WP Live Chat – CVE-2019-12498
Alert Logic security researchers discovered a new critical vulnerability in the WordPress WP Live Chat plugin (CVE-2019-12498) which could a remote attacker to exfiltrate or modify data.
5 Keys to Improve Your Cybersecurity
Jack Danahy, Alert Logic Senior Vice President, Security, presented a webinar highlighting the cybersecurity challenges organizations face today and providing 5 key recommendations for better protection.
Why Alert Logic SIEMless Threat Management Makes Sense for Your Bottom Line
Alert Logic commissioned Forrester Consulting to conduct a Total Economic Impact (TEI) study. The Total Economic Impact of Alert Logic SIEMless Threat Management report examines the potential return on investment (ROI) customers may realize by leveraging Alert Logic security-as-a-service (SaaS) solutions.
Human Expertise Is Key to Effective Cybersecurity Automation
Tools that automate cybersecurity functions have value and potential, but human expertise and having the right skills and knowledge to tune the tools and manage the resulting incidents is essential.
Alert Logic Uncovers New Vulnerability in WordPress WP Live Chat – CVE-2019-11185
Security researchers at Alert Logic discovered a vulnerability in a WordPress plugin and worked with the vendor through responsible disclosure to address and mitigate the issue.
Emerging Threat: Remote Code Execution Flaw in Oracle WebLogic
Alert Logic security researchers share details of emerging threat targeting a vulnerability in Oracle WebLogic that could allow remote code execution if successfully exploited.
Real-Time Threat Detection Is the Key to Minimizing Fallout from Cyber Attacks
Real-time threat detection and rapid incident response is the key to preventing a simple exploit or compromise from becoming a massive data breach or crippling cybersecurity event.
Active Exploitation of Confluence Vulnerability CVE-2019-3396 Dropping Gandcrab Ransomware
Alert Logic security researchers share details of active exploit of Confluence vulnerability being used to spread Gandcrab ransomware.
Wipro Compromised and Clients Hit by Supply Chain Cyber Attack
The fact that IT consulting and outsourcing giant Wipro can be compromised by a phishing scam and used as part of a supply chain cyber attack illustrates the importance of visibility and 24×7 vigilance against threats for companies of all sizes.
The Importance of Channel Partners for Cybersecurity
Channel partners are essential for the cybersecurity market–giving vendors much broader reach than they can achieve on their own and providing a trusted relationship with the customer that helps them find the tools and services they need.