5 Cybersecurity Statistics Every Small Business Should Know in 2018
A look at 5 important cybersecurity statistics in 2018 that small and medium businesses should be aware of to be better prepared to defend against malware attacks and exploits.
Emerging Threat: Jenkins Plugins Remote Code Execution
On the 20th February, 2019, Alert Logic research teams began tracking vulnerabilities affecting users of Jenkins which could allow an attacker to run malicious software remotely.
10 Must-Know 2018 Cybersecurity Statistics
See how the latest surprising cybersecurity statistics and trends are shaping plans, spending, and priorities for 2018. Get the details.
The Meltdown and Spectre CPU Bugs, Explained
The security world is spinning over the disclosure of two critical CPU vulnerabilities called Meltdown and Spectre. Here’s what you need to know.
RSA 2019 Sessions You Should Have on Your Calendar
A look at some of the cybersecurity sessions you should attend while you’re at the 2019 RSA Conference to get the most out of the event.
Simplifying Cybersecurity Deployments with Automation
A look at passive versus active scanning, host-based security, and how Alert Logic SIEMless Threat Management can automate and simplify deployment of effective cybersecurity.
Why You Don’t Need (or Want) a SIEM Tool
SIEM has been positioned and sold as some sort of cybersecurity “magic bullet” but companies have found out the hard way that implementing and managing a SIEM properly is not easy.
Understanding and Maintaining PCI Compliance
What is PCI compliance? This article looks at what PCI-DSS is and the challenges organizations face trying to achieve and maintain PCI compliance.
Plan Ahead to Get the Most Out of the 2019 RSA Conference
The 2019 RSA Conference is right around the corner, and if you’re attending you need to plan ahead to make sure you get to the keynotes, sessions and vendors you want to see to get the most value out of the event.
3 Things You Should Do on International Data Privacy Day 2019
Experts weigh in and share tips and advice to help your secure your personal information for International Data Privacy Day 2019.
One Up on Cryptominers: Alert Logic’s Threat Intelligence Unravels Techniques Used to Evade Detections
Alert Logic security researchers dig into the technical details of a recently discovered coin miner that utilizes extensive levels of obfuscation.
Defining Network Security in a Hybrid Cloud World
Effective network security is challenging, particularly with the erosion of the perimeter and the rise of cloud computing, mobile devices, DevOps, and containers.