Brook Schoenfield Discusses Threat Modeling and Secure Design

Inner Circle Podcast Episode 028 Brook Schoenfield, Master Security Architect and Director of Advisory Services for IOActive, joins me for this week’s episode of the Inner Circle podcast. We talk about the focus of the cybersecurity industry on vulnerability management and incident response, and why that reactive approach may not ... Read More

Visionary Managed Security Services Easy as P.I.E.

Gartner named Alert Logic as Visionary in the 2019 Managed Security Services Magic Quadrant report ... Read More

Detecting Suspicious and Malicious Activity on Your Network

A look at the capabilities of different network security tools like IDS, IPS, DLP, SIEM, and NBAD and the need for the right cybersecurity skills and expertise to use them effectively ... Read More

Real-Time Threat Detection Is the Key to Minimizing Fallout from Cyber Attacks

Real-time threat detection and rapid incident response is the key to preventing a simple exploit or compromise from becoming a massive data breach or crippling cybersecurity event ... Read More

Ron Gula Talks about the Importance of Getting Out of the Cybersecurity Bubble

Inner Circle Podcast Episode 027 My guest for this episode of the Inner Circle podcast is Ron Gula, co-founder of Gula Tech Adventures–a venture capital firm focused on investing in cutting edge cybersecurity startups. Prior to launching Gula Tech Adventures, though, Ron had established himself as a cybersecurity leader and ... Read More

Greater Transparency Leads to Better Cybersecurity

The threat landscape is constantly evolving, and organizations of all sizes are essentially under siege. Effective cybersecurity is essential but evaluating and selecting cybersecurity solutions is challenging for companies—especially when it comes to trying to understand claims made by vendors and ensure that different products are being measured or compared ... Read More
Your Supply Chain May Be a Trojan Horse

Your Supply Chain May Be a Trojan Horse

No organization exists in vacuum. There is no such thing as a completely self-sustaining company that does not in some way depend on suppliers, partners, and service providers. Businesses use products and services from other companies to manage and grow their own business—and that exposes them to risk. Attackers understand ... Read More

You Can’t Protect What You Can’t See

I assume—or at least hope—that it won’t come as a surprise to you that effective cybersecurity is challenging. I mean, if it were easy, we would have found a better solution by now and we wouldn’t have weekly data breaches from companies that perpetually invest significant amounts of money chasing ... Read More

Jack Danahy Shares Insight on Endpoint Protection and Simplifying Cybersecurity

Inner Circle Podcast Episode 026 This week I am joined on the Inner Circle podcast by Jack Danahy, Senior Vice President of Security for Alert Logic. As most of you know, I also work for Alert Logic by day as Senior Manager of Content Marketing. Many of you may already ... Read More
Using AI to Improve Cyber Threat Detection

Using Machine Learning to Reduce False Positives

Today’s threat landscape is massive and expanding at an alarming rate—especially given the explosion of mobile devices, hybrid cloud environments, DevOps, and containers. Organizations of all sizes, and across all industries, struggle to keep up with the volume of legitimate exploits and threats. They don’t have the time or manpower ... Read More