Category Archives: Blog

Can you identify a “cloud washed” solution?

As a result of cloud computing having a profound impact on the information security industry and the Everything-as-a-Service movement, cloud security now requires increased adaptability, virtualization and integration. …

March 02, 2015 //

Read more ›

Cloud Security Lands in Seattle

With the high concentration of cloud and technology companies, Seattle is a natural fit for Alert Logic’s sixth office, which houses members of our engineering, sales, business development, …

February 25, 2015 //

Read more ›

ISEO and Implications for Proactive Cybersecurity

On Friday at the White House Summit on Cybersecurity and Consumer Protection, President Barack Obama signed an Information Sharing Executive Order to promote cybersecurity information sharing in the …

February 19, 2015 //

Read more ›

Now introducing Zero Day magazine

Today, we released the inaugural issue of Zero Day, a quarterly digital publication that provides IT security professionals with a broader view of the current state of IT …

February 03, 2015 //

Read more ›

A critical bug “Ghost” allows for code execution, affecting Linux systems

On January 27th, Qualys discovered an interesting bug in the _nss_hostname_digits_dots( ) function of the GNU C Library which resulted in a buffer overflow. The GNU C Library …

January 29, 2015 //

Read more ›