Layering Protection in Your Azure Environment
We review best practices and native capabilities in Azure to help you protect your workloads running in the cloud.
Ironically Positive Fallout from Vault-7 : Cisco Vault-7 CVE-2017-3881
A vulnerability affecting more than 300 different Cisco router SKU’s was discovered by Cisco in the Wikileaks’ Vault-7 dump of classified CIA hacking tools and tactics utilized to gain unauthorized access to iPhone and Android Devices.
Unfolding the Apache Struts Vulnerability
Protecting and Monitoring Apache Struts, which is a critical remote code execution vulnerability affecting Struts newer versions of 2.3.5 – 2.3.31 and Struts 2.5-2.5.10.
Apache Struts Makes a Comeback
Apache Struts is a critical remote code execution vulnerability affecting Struts newer versions of 2.3.5 – 2.3.31 and Struts 2.5-2.5.10.
Three Key Elements for Integrating Security with Automated Microsoft Azure Deployments
Although there is no established framework that covers security for DevOps, we have outlined three key elements for integrating security with automated Microsoft Azure deployments.
Microsoft Azure Cloud Usage is Growing – Don’t Forget About Security
Alert Logic can help to protect your workloads in Microsoft Azure
3 New Year’s Resolutions That Every CSO Should Make
Optimize your security with three resolutions that every CSO should make to guide your efforts to staying secure in the cloud.
The Top 8 Data Security Best Practices to Protect Against a Successful Breach
Proactively evaluating and improving your existing cybersecurity strategy based on a comprehensive approach across pre-breach and post-breach risks can significantly reduce your likelihood of being affected by cybercrime. Here are 8 data security best practices that can significantly reduce the likelihood of a successful attack and minimize the impact of those that are successful.
The Cyber Kill Chain: Understanding Advanced Persistent Threats
Learn the tools, tactics, and procedures used in each of the 5 Cyber Kill Chain stages of an Advanced Persistent Threat (APT) attack.
Want the Best Data Security? Go Cloud.
Contrary to common belief, moving to the cloud is more secure than ever with the shared responsibility model.
Leverage EC2 Reserved Instances to Save Big on Scanning Overhead
Learn how to reduce your next Cloud Insight AWS bill by up to 40 percent using Amazon EC2 Reserved Instances for your scanning appliances.
Why Vulnerability Management is Important
An organization must stay ahead with a solid vulnerability management program early in the game. If you don’t, you may end up with unmanageable risks and forcing you to make even more expensive decisions down the road.