Streamline Cybersecurity with Alert Logic and AWS Security Hub
Organizations are overwhelmed with cybersecurity alerts and struggling to provide the context necessary to take action. AWS Security Hub and Alert Logic streamline the process and simplify cybersecurity for customers.
How to Prevent Fileless Malware Attacks
Malware is as old as computing itself. But as with all cyberthreats, it has evolved to be more effective and efficient. Fileless malware is one of the more pernicious threats to come along. In fact, it was identified as “the most common critical-severity cybersecurity threat to endpoints” for the first half of 2020.
65% of Port Vulnerabilities Target Just Three Ports
Our 2019 research shows that nearly two thirds of all attacks against TCP/IP ports tend to target just three of the more than 130,000 ports available.
NIST: From Cells to Cybersecurity
A look at the role of the National Institute of Standards and Technology (NIST) and the challenges organizations face trying to achieve and maintain compliance with the NIST Cybersecurity Framework guidelines.
Cybersecurity in Retail
Martin Riley, Technical Director at Timico, shares his thoughts on cybersecurity in the retail industry and the fact that the very nature of ecommerce and retail networks exposes the organization to risk and invites the attacker inside.
This Week in Cybersecurity: September 6
A look at the big news and important stories from the world of cybersecurity over the past week.
Bridging the Cybersecurity Talent and Skills Gap
The cybersecurity talent gap continues to increase. Learn how to solve this problem and improve your organization’s security.
The People Problem and Managed Security Services
Cybersecurity has a people problem. A dramatic rise in cyber attacks coupled with a severe shortage of qualified cybersecurity professionals make it very difficult to maintain effective cybersecurity. An MSSP (managed security services provider) can help.
This Week in Cybersecurity: August 30
A weekly wrap up of cybersecurity information and insights, including emerging threats, trending stories, and innovative new tools and techniques.
New Campaign Exfiltrates Credentials via DNS
Alert Logic security researchers share details of a new malware campaign detected exfiltrating credentials via DNS and guidance to help test for the exploit.
Analyzing Techniques Used in HopLight Malware
Alert Logic security researchers reverse-engineered HopLight malware to uncover the tricks and techniques used to evade detection.
The Importance of Intelligence-driven Threat Detection
Dr. Jonny Milliken, Threat Research Manager for Alert Logic, and Kenny Lemmen, Security Analyst Team Lead at Alert Logic, recently presented a webinar titled “Why You Need Intelligence Driven Threat Detection to Stay Secure” that looks at the anatomy of an attack, and the tools and processes necessary to effectively assess cybersecurity events to find the proverbial needle in the stack of needles and ensure valid cybersecurity incidents get the response and escalation necessary for effective remediation.