Evolution of the RSA Conference and What It Means for the Future of Cybersecurity
Perspectives from three cybersecurity veterans on how the RSA conference has changed over the years and what the implications are for the future of the cybersecurity industry.
Deep Dive on Jenkins Pipeline Plugin Remote Code Execution
Alert Logic Threat Intelligence researchers share details of a new threat exploiting flaws in Jenkins plugins for remote code execution attacks.
Alert Logic Expands Protection to Reduce Your Attack Surface
Alert Logic is introducing a number of new features and capabilities that expand our protection for customers and help them reduce their attack surface.
Drupal REST API Remote Code Execution
Alert Logic security researchers share details of the threat affecting Drupal REST API, which could allow remote code execution by attackers.
Defending Against Magecart Supply-Chain Attacks
Alert Logic researchers drill down to learn more about Magecart–attackers using a family of malicious supply-chain attacks against ecommerce sites.
5 Cybersecurity Statistics Every Small Business Should Know in 2018
A look at 5 important cybersecurity statistics in 2018 that small and medium businesses should be aware of to be better prepared to defend against malware attacks and exploits.
Emerging Threat: Jenkins Plugins Remote Code Execution
On the 20th February, 2019, Alert Logic research teams began tracking vulnerabilities affecting users of Jenkins which could allow an attacker to run malicious software remotely.
10 Must-Know 2018 Cybersecurity Statistics
See how the latest surprising cybersecurity statistics and trends are shaping plans, spending, and priorities for 2018. Get the details.
The Meltdown and Spectre CPU Bugs, Explained
The security world is spinning over the disclosure of two critical CPU vulnerabilities called Meltdown and Spectre. Here’s what you need to know.
RSA 2019 Sessions You Should Have on Your Calendar
A look at some of the cybersecurity sessions you should attend while you’re at the 2019 RSA Conference to get the most out of the event.
Simplifying Cybersecurity Deployments with Automation
A look at passive versus active scanning, host-based security, and how Alert Logic SIEMless Threat Management can automate and simplify deployment of effective cybersecurity.
Why You Don’t Need (or Want) a SIEM Tool
SIEM has been positioned and sold as some sort of cybersecurity “magic bullet” but companies have found out the hard way that implementing and managing a SIEM properly is not easy.