Continuous Security that Works with Your AWS Environment in a Way that Makes Sense

|
A look at Alert Logic customer CHESS Health and why they chose Alert Logic to protect their cloud workloads on AWS ... Read More
What You Should Know About Effective Container Security

What You Should Know About Effective Container Security

|
A Q&A with Mark Brooks, Global VP of Solution Engineering for Alert Logic, about issues organizations face with container security solutions and how Alert Logic is addressing them ... Read More

How to Prevent Self-Inflicted Cloud Security Threats

|
The cloud threat landscape is vast, but the reality is that the biggest issues are self-inflicted through poor configuration and security controls ... Read More

Emerging Threat Active Exploit of Apache Struts Remote Code Execution Vulnerability

|
Researchers have discovered proof-of-concept code for a new Apache Struts remote code execution vulnerability ... Read More

The Most Effective Defense is Proactive Cybersecurity

|
Responding is always better than reacting, which is why proactive cybersecurity is a more effective defense than the traditional reactive approach to defending against attacks and exploits ... Read More

Alert Logic Cloud Insight Essentials Certified for CIS AWS Foundations Benchmark

|
The Center for Internet Security (CIS) has certified Alert Logic Cloud Insight Essentials for the AWS Foundations Benchmark ... Read More

5 Keys for Effective Threat Detection

|
There is no perfect security solution, but effective threat detection can help you avoid most attacks and quickly identify and remediate the ones that get through your defenses to minimize the impact ... Read More

60% of Organizations Risk Missing the GDPR Deadline

|
A new report from Cybersecurity Insiders reveals that a majority of organizations are not going to be GDPR compliant on May 25 when the new rules go into effect--and some suggest it could still take another 4 years or more to achieve compliance ... Read More

Biggest Cloud Security Threats are Self-Inflicted

|
A new cloud security report from Cybersecurity Insiders--the 2018 Cloud Security Spotlight--provides a revealing look at the fact that many of the primary threats to cloud security and causes of cloud security incidents are actually avoidable ... Read More

Remote Code Execution Vulnerability Exposes Drupal to Potential Attacks

|
Exploits are circulating in the wild for a pair of vulnerabilities in the popular Drupal content management system (CMS) ... Read More