Get Ready for AWS re:Invent 2017 – Top Session Picks
AWS re:Invent is coming up at the end of November, and registration has opened up for the hundreds of sessions. Misha Govshteyn, co-founder and SVP of products for Alert Logic, shares his recommendations for top sessions you should try to attend.
How to Talk about Cybersecurity in Your Organization
Communication is a core component of effective cybersecurity. This guest post from Jeff Man, respected information security expert and co-host of Paul’s Security Weekly, explores what it takes to talk about cybersecurity in your organization.
Let He Who Is Without Web App Vulnerabilities Cast the First Stone at Equifax
Equifax suffered a major data breach, but it’s important for organizations to understand their own attack surface and consider whether or not they might also be exposed to risk through vulnerable web applications and poor patch management processes.
Meeting the Pace of PCI Compliance
A look at some of the challenges of achieving and sustaining PCI compliance in multi-cloud and hybrid environments.
Your Threats May Be Persistent, But They’re Really Not That Advanced
Much of cyber security today is driven by the narrative of Advanced Persistent Threats (APTs). However, that creates a false sense these attacks are “special” when most of those threats are not all that advanced.
G-Cloud 9 and the CyberSecurity of Public Sector Organizations
A look at the Cloud Security Principles from the National Cyber Security Centre and Alert Logic’s role in the G-Cloud 9 platform of the Digital Marketplace.
Brexit Won’t Get UK Out of General Data Protection Regulation (GDPR) Compliance
Thanks to Brexit, the UK is poised to separate from the European Union. However, compliance with the General Data Protection Regulation (GDPR) will still be necessary even for UK businesses.
Tip 5 of Protecting Your SQL-based Cloud Environment: Intelligent Log Analysis
This post examines cloud security and protecting web applications with a focus on the role of consistent and intelligent log analysis.
Tip 4 of Protecting Your SQL-based Cloud Environment – Identity and Access Management
The 4th tip of our 5-part series explores how effective identity access management (IAM) and diligent patching and updating of systems and applications improve your cloud security posture.
Protect Your SQL-based Cloud Environment with WAFs & IDS
We explore the crucial role of web application firewalls (WAF) and intrusion detection systems (IDS) as a layer of defense for protecting web applications in the cloud.
Protecting Your SQL-based Cloud Environment: Vulnerability Scanning & Penetration Testing
Vulnerability scanning and penetration testing play an important role in the overall security of your web applications and cloud environment.
Tip 1 of Protecting Your SQL-based Cloud Environment – Secure Coding Practices
Secure coding practices are the first line of defense against web application security flaws like injection and cross-site scripting.