Identity and Access Management Misconfigurations Top the List of Exposures in AWS Workloads
Misconfiguration is a leading cause of security issues for AWS cloud workloads, and identity and access management (IAM) is one of the most common configuration issues.
Check Out the New and Improved Alert Logic Support Center
Alert Logic launched a redesigned Alert Logic Support Center site with a variety of improvements and new features to help you find the resources and information you need.
Adopting a Shared Security Model for Cloud
Cloud workload security is based on a shared responsibility model. Do you know what part of cloud security you’re responsible for?
9 Things to Know Before AWS re:Invent
Matt Schafer sat down with resident AWS re:Invent expert Ryan Holland to get the inside scoop on how to prepare for and what to expect at AWS re:Invent 2017.
Web Apps are Eating the World…and Exposing You to Risk
The explosion of web apps has led to a dramatic rise in attackers targeting vulnerabilities in web applications. Web applications are putting your organization and sensitive data at risk.
What You Need to Know to Tame ‘Bad Rabbit’ Ransomware
Bad Rabbit ransomware has been spreading around the world. Here is what we know about this malware and what you can do to detect and avoid becoming a victim of this attack.
Get Ready for AWS re:Invent 2017 – Top Session Picks
AWS re:Invent is coming up at the end of November, and registration has opened up for the hundreds of sessions. Misha Govshteyn, co-founder and SVP of products for Alert Logic, shares his recommendations for top sessions you should try to attend.
How to Talk about Cybersecurity in Your Organization
Cybersecurity communications is critical for effective security. Learn about what it takes to talk about cybersecurity in your business.
Let He Who Is Without Web App Vulnerabilities Cast the First Stone at Equifax
Equifax suffered a major data breach, but it’s important for organizations to understand their own attack surface and consider whether or not they might also be exposed to risk through vulnerable web applications and poor patch management processes.
Meeting the Pace of PCI Compliance
A look at some of the challenges of achieving and sustaining PCI compliance in multi-cloud and hybrid environments.
Your Threats May Be Persistent, But Are They Advanced?
Much of cybersecurity is driven by the narrative of Advanced Persistent Threats (APTs). However, that creates a false sense these attacks are “special” when most of those threats are not all that advanced.
G-Cloud 9 and the CyberSecurity of Public Sector Organizations
A look at the Cloud Security Principles from the National Cyber Security Centre and Alert Logic’s role in the G-Cloud 9 platform of the Digital Marketplace.