Home / Blog / All Blog Posts

Alert Logic Blogs Posts

Demystifying Ransomware Detection Coverage Along the Kill Chain

Demystifying Ransomware Detection Coverage Along the Kill Chain

Ransomware creators are organized, global, and opportunistic. They operate much like enterprises with service desks and attack kits and take advantage of every opportunity, like the pandemic, to exploit weaknesses and vulnerabilities. There is no apparent end to their creativity — the latest attack types, in fact, hide within legitimate processes, making them very difficult to detect.

What is DevSecOps?

What is DevSecOps?

Applications drive business operations. Most organizations have developers who create and deploy software. For companies that develop software, securing their products and proving security is a way to build customer trust. However, threat actors increasingly target these applications because developers may not always be security professionals. For example, according to research, 56% of the largest incidents in the past five years can be traced to web application security issues. Organizations with development teams should understand what DevSecOps is and how to implement it.

Changing the Game: Hunting Ransomware with Threat Intelligence

Changing the Game: Hunting Ransomware with Threat Intelligence

In this blog, we’ll examine the typical progression of ransomware, how it has changed (and continues to change), and how advanced threat intelligence is necessary in order to be proactive in detecting and responding to such attacks.  

What Is GDPR Compliance?

What Is GDPR Compliance?

In this post, we take a close look at important sections of the GDPR and how they relate to your cybersecurity strategy. 

The Biggest Mistakes in Multi-Cloud Environments & How to Avoid Them

The Biggest Mistakes in Multi-Cloud Environments & How to Avoid Them

While adopting a multi-cloud strategy can make your business more efficient and agile, it can also have considerable downsides if not implemented carefully. In working with our customers, we typically see organizations make the same handful of mistakes. Here are three of the biggest.

HITRUST vs. HIPAA

HITRUST vs. HIPAA

The two acronyms – HITRUST and HIPAA – sound similar and both address data protection, so it’s common for people to believe they’re essentially the same. However, HITRUST and HIPAA play separate but related roles in securing patient data.

What Is Endpoint Security and Why Is It Vital?

What Is Endpoint Security and Why Is It Vital?

Like most organizations, you’re likely challenged with defending an ever-expanding attack surface — all the avenues an attacker can get into your network and compromise sensitive data. In fact, over the last decade the average attack surface has substantially grown as the number of devices that connect to a company’s network has rapidly multiplied.

Just Scratching the Surface: Exploring Alert Logic — an MDR Leader

Just Scratching the Surface: Exploring Alert Logic — an MDR Leader

Alert Logic was named a Leader in the IDC MarketScape: U.S. Managed Detection and Response Services 2021 Vendor Assessment,1 in which 15 managed detection and response (MDR) providers were evaluated on current and future capabilities. The report presents a thorough analysis of these solutions for organizations seeking to strengthen their posture against cybersecurity threats.

Alert Logic’s Take on the Atlassian Confluence Flaw

Alert Logic’s Take on the Atlassian Confluence Flaw

Alert Logic has been actively investigating this new OGNL injection vulnerability – CVE-2021-26084 – in the Confluence Server and Data Center. This is not the first time our threat intelligence team has seen an issue with Confluence, so we are seasoned with such a threat. 

Ready to Protect Your Company with Alert Logic MDR?