Apache Struts Vulnerability Exploited in New Cryptomining Attack
The Alert Logic Active Watch team digs into the latest Apache Struts vulnerability with a deeper technical analysis and the discovery of a malicious payload.
How to Prevent Self-Inflicted Cloud Security Threats
The cloud threat landscape is vast, but the reality is that the biggest issues are self-inflicted through poor configuration and security controls.
Emerging Threat: Active Exploit of Apache Struts Remote Code Execution Vulnerability
Researchers have discovered proof-of-concept code for a new Apache Struts remote code execution vulnerability.
Intrusion Detection for Containers Q&A: What’s Next for Alert Logic’s Container Security Initiatives
The third in a 3-part Q&A series that examines container security and the role of network intrusion detection in a container environment.
Take a Proactive Approach to Security with Threat Hunting
Dr. Jonny Milliken, Threat Intelligence Manager for Alert Logic, and Holger Schulze, CEO of Cybersecurity Insiders, recently presented a threat hunting webinar on the value and importance of threat hunting.
Intrusion Detection for Containers Q&A
Part 2 of the intrusion detection for containers Q&A series delves into the distinction between host intrusion detection systems (HIDS) and network intrusion detection systems (NIDS) and why that matters.
Intrusion Detection for Containers Q&A: A Critical Part of the Container Security Landscape
A Q&A with Alert Logic’s Matt Harkrider and John Norden about the issues organizations face when it comes to securing containers and containerized applications.
What You Need to Know about GDPR and the 72-Hour Breach Notification
A look at articles 33 and 34 of the GDPR (General Data Protection Regulation) and how to address the challenge of the 72-hour breach notification requirement.
Emerging Threat: Active Exploit of Oracle WebLogic JSP File Upload Vulnerability
Alert Logic security researchers have discovered an active exploit in the wild for CVE-2018-2894, an Oracle WebLogic JSP File Upload Vulnerability. Here is what we know and what you should do.
Worried About Container Security? Network Intrusion Detection Can Help
Learn how Alert Logic’s network intrusion detection for containers addresses the security challenges faced by IT organizations. As businesses adopt containerization, security teams struggle to monitor network traffic, leaving them vulnerable to attacks. Our solution ensures robust protection, making it easier to detect threats targeting your containers and hosts.
Use These Frameworks to Establish GDPR Security Controls
As with just about any new technology, the benefits of containers come with a number of unique security concerns.
GDPR Q&A with a Cybersecurity, Compliance and Privacy Expert
Alert Logic’s Audian Paxson conducts a Q&A on GDPR with cybersecurity, compliance and privacy expert Tom Cornelius.