9 Things to Know Before AWS re:Invent
Matt Schafer sat down with resident AWS re:Invent expert Ryan Holland to get the inside scoop on how to prepare for and what to expect at AWS re:Invent 2017.
Web Apps are Eating the World…and Exposing You to Risk
The explosion of web apps has led to a dramatic rise in attackers targeting vulnerabilities in web applications. Web applications are putting your organization and sensitive data at risk.
What You Need to Know to Tame ‘Bad Rabbit’ Ransomware
Bad Rabbit ransomware has been spreading around the world. Here is what we know about this malware and what you can do to detect and avoid becoming a victim of this attack.
Get Ready for AWS re:Invent 2017 – Top Session Picks
AWS re:Invent is coming up at the end of November, and registration has opened up for the hundreds of sessions. Misha Govshteyn, co-founder and SVP of products for Alert Logic, shares his recommendations for top sessions you should try to attend.
How to Talk about Cybersecurity in Your Organization
Cybersecurity communications is critical for effective security. Learn about what it takes to talk about cybersecurity in your business.
Let He Who Is Without Web App Vulnerabilities Cast the First Stone at Equifax
Equifax suffered a major data breach, but it’s important for organizations to understand their own attack surface and consider whether or not they might also be exposed to risk through vulnerable web applications and poor patch management processes.
Meeting the Pace of PCI Compliance
A look at some of the challenges of achieving and sustaining PCI compliance in multi-cloud and hybrid environments.
Your Threats May Be Persistent, But Are They Advanced?
Much of cybersecurity is driven by the narrative of Advanced Persistent Threats (APTs). However, that creates a false sense these attacks are “special” when most of those threats are not all that advanced.
G-Cloud 9 and the CyberSecurity of Public Sector Organizations
A look at the Cloud Security Principles from the National Cyber Security Centre and Alert Logic’s role in the G-Cloud 9 platform of the Digital Marketplace.
Brexit Won’t Get UK Out of GDPR Compliance
Thanks to Brexit, the UK is poised to separate from the European Union. However, compliance with the General Data Protection Regulation (GDPR) will still be necessary even for UK businesses.
Protecting Your SQL-based Cloud Environment — Identity and Access Management
The 4th tip of our 5-part series explores how effective identity access management (IAM) and diligent patching and updating of systems and applications improve your cloud security posture.
Protect Your SQL-based Cloud Environment with WAFs & IDS
We explore the crucial role of web application firewalls (WAF) and intrusion detection systems (IDS) as a layer of defense for protecting web applications in the cloud.