Gartner Ranks Alert Logic as a Challenger in the IDPS Magic Quadrant
Thanks in part to some changes in the criteria used to assess solutions, Gartner recognizes Alert Logic as a Challenger in the 2018 Intrusion Detection and Prevention Systems (IDPS) Magic Quadrant.
Beware the WebLogic WLS-WSAT Component Deserialization RCE Exploit
Beware the WebLogic WLS-WSAT Component Deserialization RCE Exploit
Full Stack Security: Protecting Packaged Applications
This post examines the risks faced by packaged applications and how Alert Logic helps customers defend the top layer of the stack.
What You Need to Know about Spectre and Meltdown
Two critical vulnerabilities–Spectre and Meltdown–have the potential to put virtually every server, PC, and mobile device at risk. Find out what you need to know about these threats and how to defend against them.
The Case for Full Stack Cloud Security
The first in a series on the importance of full stack security and how Alert Logic delivers full stack security for customers.
Effectively Respond to Amazon GuardDuty Findings using Alert Logic MDR Essentials Portal
Reviews this step-by-step guide on how Alert Logic MDR Essentials leverages Amazon GuardDuty to protect your AWS environment.
Identity and Access Management (IAM) Misconfigurations Top the List of Exposures in AWS Cloud Environments
Misconfiguration is a leading cause of security issues for AWS cloud workloads, and identity and access management (IAM) is one of the most common configuration issues.
Check Out the New and Improved Alert Logic Support Center
Alert Logic launched a redesigned Alert Logic Support Center site with a variety of improvements and new features to help you find the resources and information you need.
Adopting a Shared Security Model for Cloud
Cloud workload security is based on a shared responsibility model. Do you know what part of cloud security you’re responsible for?
9 Things to Know Before AWS re:Invent
Matt Schafer sat down with resident AWS re:Invent expert Ryan Holland to get the inside scoop on how to prepare for and what to expect at AWS re:Invent 2017.
Web Apps are Eating the World…and Exposing You to Risk
The explosion of web apps has led to a dramatic rise in attackers targeting vulnerabilities in web applications. Web applications are putting your organization and sensitive data at risk.
What You Need to Know to Tame ‘Bad Rabbit’ Ransomware
Bad Rabbit ransomware has been spreading around the world. Here is what we know about this malware and what you can do to detect and avoid becoming a victim of this attack.