Home / Blog / All Blog Posts

Alert Logic Blogs 

Head to Head: MDR vs SIEM

Head to Head: MDR vs SIEM

Many companies turn to security information and event management (SIEM) solutions to improve their security posture. They are designed to give companies a centralized view of security events, intended to make it easier for them to detect and respond to threats accordingly. But just how effective is SIEM compared to a managed detection and response (MDR) solution? In this post, we look at MDR vs. SIEM and see which is the best option for your organization.

Security Front and Center at AWS re:Inforce 2023

Security Front and Center at AWS re:Inforce 2023

In the ever-expanding IT universe, the majority of my tech career has been spent orbiting the giant orange star that is Amazon Web Services (AWS). Pulled in by the massive gravitational force that is AWS, thousands like me descended on the Anaheim Convention Center...

On-Premises vs. Cloud Computing: What’s the Difference?

On-Premises vs. Cloud Computing: What’s the Difference?

While both run applications and enable business operations, cloud and on-premises have several important differences including resource availability, payment model, maintenance and management, security, and financial accounting.

Cloud Delivery Models Demystified

Cloud Delivery Models Demystified

Explore the key cloud computing service delivery models — SaaS, PaaS, and IaaS — and discover which option best meets your needs.

5 Common Indicators of a Phishing Attempt

5 Common Indicators of a Phishing Attempt

Phishing is one of the most common and effective cybersecurity attack vectors and it’s on the rise. In 2023, 74% of account takeovers were launched from phishing. Within 10 minutes of a malicious email appearing in their inbox, 84% of employees either replied to it with sensitive information or interacting with a spoofed link or attachment. And nearly half of email users mistakenly believe that clicking on a malicious link or opening a malicious attachment will only impact their device.

How Does Ransomware Work?

How Does Ransomware Work?

With ransomware on the rise in recent years, you must understand how it infiltrates and compromises your system. From there, you can take steps to fight it.

Ready to Protect Your Company with Alert Logic?