Defining Network Security in a Hybrid Cloud World
Effective network security is challenging, particularly with the erosion of the perimeter and the rise of cloud computing, mobile devices, DevOps, and containers.
New Runtimes Provided by Alert Logic Widen the Playing Field for AWS Lambda
Read this blog post to get a good understanding of what is means to have Alert Logic support AWS Lambda. Tony Bradley does a great job at breaking it down.
Alert Logic Announces Support for New AWS Security Hub
Alert Logic is excited about the new AWS Security Hub service and proud to announce our support for and integration with AWS Security Hub.
Alert Logic Achieves AWS Container Security Competency Status
Alert Logic announced today that our threat management offering has achieved Amazon Web Services (AWS) Container Competency Status.
Cybersecurity at AWS re:Invent
There is a lot going on at an event the size of AWS re:Invent, but as a leading provider of cybersecurity solutions our focus is understandably on cybersecurity.
5 Crucial Things You Need to Know for AWS re:Invent
If you are new to AWS re:Invent, these 5 tips are crucial for you to make sure you get the most out of the event, and survive to come again another year.
Emerging Threat: Blueimp jQuery-File-Upload Crops Up Again
Alert Logic security researchers share crucial information about an emerging threat affecting jQuery File Upload Plugin in the wild.
Threat Intelligence Report – PowerShell Dropper: Kilences
The Alert Logic Threat Intelligence team shares new research and insight on Kilences–a PowerShell dropper that can deliver damaging malicious payloads.
Threat Intelligence Report – Active Webshell: Big Bang Bot
Alert Logic security researchers share threat intelligence details for a new active webshell threat that is being used as a dropper or precursor for additional malware and exploits.
Attackers Have Compressed and Accelerated the Cyber Killchain
While analyzing data for the Critical Watch Report, Alert Logic researchers determined that attacks have accelerated and compressed the cyber killchain.
4 Benefits of a Security Operations Center
A look at some of the primary reasons most organizations will benefit from working with a third-party Security Operations Center (SOC).
Why SIEM Is a Process, Not a Product
Alert Logic’s Dan Pitman looks at some of the issues organizations face with SIEM (security incident and event management) tools and why the value of a SIEM is a function of how effectively it is managed and maintained.