Why SIEM Is a Process, Not a Product
Alert Logic’s Dan Pitman looks at some of the issues organizations face with SIEM (security incident and event management) tools and why the value of a SIEM is a function of how effectively it is managed and maintained.
Apache Struts Vulnerability Exploited in New Cryptomining Attack
The Alert Logic Active Watch team digs into the latest Apache Struts vulnerability with a deeper technical analysis and the discovery of a malicious payload.
How to Prevent Self-Inflicted Cloud Security Threats
The cloud threat landscape is vast, but the reality is that the biggest issues are self-inflicted through poor configuration and security controls.
Emerging Threat: Active Exploit of Apache Struts Remote Code Execution Vulnerability
Researchers have discovered proof-of-concept code for a new Apache Struts remote code execution vulnerability.
Intrusion Detection for Containers Q&A: What’s Next for Alert Logic’s Container Security Initiatives
This blog examines container security and the role of network intrusion detection in a container environment.
Take a Proactive Approach to Security with Threat Hunting
Threat hunting takes a comprehensive, holistic approach to proactively monitor for and identify suspicious or potentially malicious activity
Intrusion Detection for Containers Q&A
Part 2 of the intrusion detection for containers Q&A series delves into the distinction between host intrusion detection systems (HIDS) and network intrusion detection systems (NIDS) and why that matters.
Intrusion Detection for Containers Q&A: A Critical Part of the Container Security Landscape
A Q&A focused on the issues organizations face when it comes to container security and containerized applications.
What You Need to Know about GDPR and the 72-Hour Breach Notification
A look at articles 33 and 34 of the GDPR (General Data Protection Regulation) and how to address the challenge of the 72-hour breach notification requirement.
Emerging Threat: Active Exploit of Oracle WebLogic JSP File Upload Vulnerability
Alert Logic security researchers have discovered an active exploit in the wild for CVE-2018-2894, an Oracle WebLogic JSP File Upload Vulnerability. Here is what we know and what you should do.
Worried About Container Security? Network Intrusion Detection Can Help
Learn how Alert Logic’s network intrusion detection for containers addresses the security challenges faced by IT organizations. As businesses adopt containerization, security teams struggle to monitor network traffic, leaving them vulnerable to attacks. Our solution ensures robust protection, making it easier to detect threats targeting your containers and hosts.
Use These Frameworks to Establish GDPR Security Controls
As with just about any new technology, the benefits of containers come with a number of unique security concerns.