Worried About Container Security? Network Intrusion Detection Can Help
As with just about any new technology, the benefits of containers come with a number of unique security concerns. In this blog post, Cybersecurity expert Tony Bradley explains the significance of this breakthrough in Container Security
Use These Frameworks to Establish GDPR Security Controls
As with just about any new technology, the benefits of containers come with a number of unique security concerns.
GDPR Q&A with a Cybersecurity, Compliance and Privacy Expert
Alert Logic’s Audian Paxson conducts a Q&A on GDPR with cybersecurity, compliance and privacy expert Tom Cornelius.
What You Need to Know about GDPR Article 32
This post focuses on Article 32 of the GDPR and breaks it down to try and understand exactly what the rule prescribes when it comes to IT security and data protection.
What GDPR Compliance means to the IT Security Professional
Read this blog to unpack why 7 percent of companies surveyed in our new 2018 GDPR Compliance Report said they were on track to be compliant when the GDPR came into force on May 25, 2018.
5 Keys for Effective Threat Detection
There is no perfect security solution, but effective threat detection can help you avoid most attacks and quickly identify and remediate the ones that get through your defenses to minimize the impact.
SSH Worming CryptoMiner Targets Vulnerable WebLogic Instances
Attackers have combined known POCs for WebLogic CVE-2017-10271 with a clever script that attempts to worm across the victims network by abusing recent SSH connections and stored SSH private keys.
PHP Vulnerabilities Old and New – Part 2
Joe Hitchcock continues his examination of PHP vulnerabilities–diving deep into the world of SQL injection.
The Benefits and Challenges of Threat Hunting
A new report–sponsored by Alert Logic–examines the growing trend of threat hunting, and the unique benefits and challenges of taking a more proactive approach to security.
Alert Logic Full Stack Security: Protecting Your Development Platform
Learn how Alert Logic full stack security helps defend against common vulnerabilities and exploits in popular development platforms.
Why a SOC Is Crucial for Effective Cloud Security
A look at why a security operations center (SOC) plays such a crucial role in providing effective cloud security.
PHP Vulnerabilities Old and New
The first in a series of posts examining language-based vulnerabilities and exploits. This post focuses on command execution vulnerabilities in PHP.