Alert Logic Blog

In this blog, Alert Logic provides commentary on topics that are related to our technologies, such as log management, threat management, and IT compliance management.

Microsoft Ignite 2015: 2 Key Takeaways

The week started out gloomy and rainy in Chicago, but it definitely didn’t deter the attendees from bustling to the convention center for Microsoft Ignite. The energy was …

May 28, 2015 //

Read more

Cloud Security Powers Protection of Genome Data

When the end goals of security and compliance are coupled with technology that focuses on finding cures for diseases, scientific discovery takes on a compelling twist.We recently published …

May 27, 2015 //

Read more

RSAC 2015: A Retrospective

This year, RSA Conference boasted over 33,000 in attendance and featured 290 different sessions and 700 speakers. All of the technologies and parties that people have come to …

May 19, 2015 //

Read more

VENOM: A Good Excuse to Review Your Vulnerability Response Plan

On Tuesday, researchers from CrowdStrike disclosed a potentially dangerous vulnerability, “Virtualized Environment Neglected Operations Manipulation” (VENOM), which allows attackers to escape a virtual machine and access any virtual …

May 14, 2015 //

Read more

Posted by: Steve Salinas, Director of Product Marketing

Comments Off on VENOM: A Good Excuse to Review Your Vulnerability Response Plan

Your Role in AWS Application Security

Amazon’s inclusion of Amazon Web Services (AWS) revenue ($6 billion) in their most recent quarterly earnings release validates the continued broad appeal and adoption of the leading cloud …

May 06, 2015 //

Read more

Subscribe To Our Blog Digest

Subscribe To Zero Day Magazine
Contact Us
  • Toll Free: +1.877.484.8383
    Corporate: +1.713.484.8383
    UK: +44 (0) 203 011 5533
    Fax: +1.713.660.7988
  • Alert Logic, Inc.
    1776 Yorktown, 7th Floor
    Houston, TX 77056

E-mail: info@alertlogic.com

Support: support@alertlogic.com