Resource Library

Welcome to the Alert Logic community. Search for information on the latest cloud-based security solutions, Weekly Threat Report, up-to-date news on security challenges and trends, whitepapers from leading industry professionals, and more.

No results for your current filter.

  • Intrusion Detection and Prevention Systems Providers
    Industry Reports
    Intrusion Detection and Prevention Systems Providers
    Learn More
  • 2018 State of Security Infographic
    Infographics
    2018 State of Security Infographic
    Learn More
  • Blog
    Test For API
    Learn More
  • Cloudspace USA
    Case Studies
    Cloudspace USA
    Learn More
  • CHESS Health
    Case Studies
    CHESS Health
    Learn More
  • Esendex
    Case Studies
    Esendex
    Learn More
  • Seedrs
    Case Studies
    Seedrs
    Learn More
  • LQID
    Case Studies
    LQID
    Learn More
  • Container Security Overview
    Datasheets
    Container Security Overview
    Learn More
  • UPCOMING
    Threat Hunting, the Difference Between Safe and Sorry.
    Webinars
    Threat Hunting, the Difference Between Safe and Sorry.
    Register Now
  • Container Security Workbook: A Best Practices Guide
    Whitepapers
    Container Security Workbook: A Best Practices Guide
    Learn More
  • Top Business Security Risks and How You Can Fight Back
    Webinars | On-Demand
    Top Business Security Risks and How You Can Fight Back
    Watch Now
  • Visibility: The Key To Better Threat Detection
    Webinars | On-Demand
    Visibility: The Key To Better Threat Detection
    Watch Now
  • The Biggest Cloud Security Threats are Self-Inflicted
    Webinars | On-Demand
    The Biggest Cloud Security Threats are Self-Inflicted
    Watch Now
  • Integrating Security and Compliance within Fintech
    Webinars | On-Demand
    Integrating Security and Compliance within Fintech
    Watch Now
  • Managing Threat Detection and Response for Securing AWS
    Webinars | On-Demand
    Managing Threat Detection and Response for Securing AWS
    Watch Now
  • Lessons Learned from the Cyber Security Front Line
    Webinars | On-Demand
    Lessons Learned from the Cyber Security Front Line
    Watch Now
  • Let’s Go Threat Hunting: Insight into Potential Threats and Risks
    Webinars | On-Demand
    Let’s Go Threat Hunting: Insight into Potential Threats and Risks
    Watch Now
  • To SIEM or Not To SIEM: Protecting Applications in Cloud & Hybrid Environments
    Webinars | On-Demand
    To SIEM or Not To SIEM: Protecting Applications in Cloud & Hybrid Environments
    Watch Now
  • Tales from the SOC: Live Simulated Hack
    Webinars | On-Demand
    Tales from the SOC: Live Simulated Hack
    Watch Now
  • 2018 GDPR Compliance Infographic
    Infographics
    2018 GDPR Compliance Infographic
    Learn More
  • What You Need to Know about GDPR Article 32
    Blog
    What You Need to Know about GDPR Article 32
    Learn More
  • Cross Site Scripting Attack: Client-Side Injection Attacks
    Blog
    Cross Site Scripting Attack: Client-Side Injection Attacks
    Learn More
  • What GDPR Compliance means to the IT Security Professional
    Blog
    What GDPR Compliance means to the IT Security Professional
    Learn More
  • 2018 Cloud Security Infographic: Cloud Security Concerns Are On The Rise
    Infographics
    2018 Cloud Security Infographic: Cloud Security Concerns Are On The Rise
    Learn More
  • GDPR Solution Overview
    Datasheets
    GDPR Solution Overview
    Learn More
  • Alert Logic Cloud Insight Essentials Certified for CIS AWS Foundations Benchmark
    Blog
    Alert Logic Cloud Insight Essentials Certified for CIS AWS Foundations Benchmark
    Learn More
  • 5 Keys for Effective Threat Detection
    Blog
    5 Keys for Effective Threat Detection
    Learn More
  • The Quickest Way to Get Hacked in the Cloud
    Webinars | On-Demand
    The Quickest Way to Get Hacked in the Cloud
    Watch Now
  • 60% of Organizations Risk Missing the GDPR Deadline
    Blog
    60% of Organizations Risk Missing the GDPR Deadline
    Learn More
  • Biggest Cloud Security Threats are Self-Inflicted
    Blog
    Biggest Cloud Security Threats are Self-Inflicted
    Learn More
  • Alert Logic Container IDS Solution Detects Cryptomining Attack on AWS
    Blog
    Alert Logic Container IDS Solution Detects Cryptomining Attack on AWS
    Learn More
  • 2018 Cloud Security Spotlight
    Industry Reports
    2018 GDPR Compliance Report
    Learn More
  • Remote Code Execution Vulnerability Exposes Drupal to Potential Attacks
    Blog
    Remote Code Execution Vulnerability Exposes Drupal to Potential Attacks
    Learn More
  • Cybersecurity Technologies: Not All IT Security Tools Are Created Equal
    Blog
    Cybersecurity Technologies: Not All IT Security Tools Are Created Equal
    Learn More
  • Threat Hunting Infographic
    Infographics
    Threat Hunting Infographic
    Learn More
  • SSH Worming CryptoMiner Targets Vulnerable WebLogic Instances
    Blog
    SSH Worming CryptoMiner Targets Vulnerable WebLogic Instances
    Learn More
  • Insight into How Attackers Leverage Docker Security against You
    Blog
    Insight into How Attackers Leverage Docker Security against You
    Learn More
  • Tango
    Case Studies
    Tango
    Learn More
  • Alert Logic Customers Share Their Thoughts on Cloud Workload Protection
    Blog
    Alert Logic Customers Share Their Thoughts on Cloud Workload Protection
    Learn More
  • Effective Threat Detection and Incident Response
    Blog
    Effective Threat Detection and Incident Response
    Learn More
  • What You Should Know about GDPR Compliance
    Blog
    What You Should Know about GDPR Compliance
    Learn More
  • SIEM Solutions for Security: What Vendors Won’t Tell You
    Whitepapers
    SIEM Solutions for Security: What Vendors Won’t Tell You
    Learn More
  • 5 Top Recommendations for Effective Threat Detection Guide
    Whitepapers
    5 Top Recommendations for Effective Threat Detection Guide
    Learn More
  • Why SIEM Solutions Can Fail You in Hybrid IT
    Whitepapers
    Why SIEM Solutions Can Fail You in Hybrid IT
    Learn More
  • 2018 Cloud Security Spotlight
    Industry Reports
    2018 Cloud Security Spotlight
    Learn More
  • PHP Vulnerabilities Old and New - Part 2
    Blog
    PHP Vulnerabilities Old and New - Part 2
    Learn More
  • The Benefits and Challenges of Threat Hunting
    Blog
    The Benefits and Challenges of Threat Hunting
    Learn More
  • eBook: 5 Techniques to Protect Against a SQL Injection Attack
    Whitepapers
    eBook: 5 Techniques to Protect Against a SQL Injection Attack
    Learn More
  • 2018 Threat Hunting Report
    Industry Reports
    2018 Threat Hunting Report
    Learn More
  • Is a SIEM Solution Right for Your Business?
    Webinars | On-Demand
    Is a SIEM Solution Right for Your Business?
    Watch Now
  • How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic
    Webinars | On-Demand
    How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic
    Watch Now
  • GDPR Compliance Emergency Kit: Improve Your Cybersecurity Posture
    Webinars | On-Demand
    GDPR Compliance Emergency Kit: Improve Your Cybersecurity Posture
    Watch Now
  • Context Is Crucial When It Comes to Cloud Security
    Blog
    Context Is Crucial When It Comes to Cloud Security
    Learn More
  • Journey to Realisation: The Security Challenge in a Hybrid Environment
    Webinars | On-Demand
    Journey to Realisation: The Security Challenge in a Hybrid Environment
    Watch Now
  • Alert Logic Full Stack Security: Protecting Your Development Platform
    Blog
    Alert Logic Full Stack Security: Protecting Your Development Platform
    Learn More
  • Managed Threat Detection and Response for Securing AWS Applications
    Webinars | On-Demand
    Managed Threat Detection and Response for Securing AWS Applications
    Watch Now
  • Why a SOC Is Crucial for Effective Cloud Security
    Blog
    Why a SOC Is Crucial for Effective Cloud Security
    Learn More
  • PHP Vulnerabilities Old and New
    Blog
    PHP Vulnerabilities Old and New - Part 1
    Learn More
  • Proof That Cyber Attackers Care About ROI Just as Much as You Do
    Blog
    Proof That Cyber Attackers Care About ROI Just as Much as You Do
    Learn More
  • How Cloud Insight Essentials Helps Manage Multiple Amazon GuardDuty Accounts
    Blog
    How Cloud Insight Essentials Helps Manage Multiple Amazon GuardDuty Accounts
    Learn More
  • The Ins & Outs of Your Ever-Evolving Cloud Security Strategy
    Webinars | On-Demand
    The Ins & Outs of Your Ever-Evolving Cloud Security Strategy
    Watch Now
  • Alert Logic Full Stack Security: Protecting App Frameworks
    Blog
    Alert Logic Full Stack Security: Protecting App Frameworks
    Learn More
  • Top 5 Cloud Security Issues for 2018
    Blog
    Top 5 Cloud Security Issues for 2018
    Learn More
  • The Security Operations Center (SOC) Protection You Need To Defend Against Cloud Threats
    Webinars | On-Demand
    The Security Operations Center (SOC) Protection You Need To Defend Against Cloud Threats
    Watch Now
  • Gartner Ranks Alert Logic as a Challenger in the IDPS Magic Quadrant
    Blog
    Gartner Ranks Alert Logic as a Challenger in the IDPS Magic Quadrant
    Learn More
  • Beware the WebLogic WLS-WSAT Component Deserialization RCE Exploit
    Blog
    Beware the WebLogic WLS-WSAT Component Deserialization RCE Exploit
    Learn More
  • Secure by Default: Using System Hardening to Prevent Threats
    Industry Reports
    Secure by Default: Using System Hardening to Prevent Threats
    Learn More
  • Get Centralized Visibility with Cloud Insight Essentials into Amazon GuardDuty Findings Across Regions
    Blog
    Get Centralized Visibility with Cloud Insight Essentials into Amazon GuardDuty Findings Across Regions
    Learn More
  • Alert Logic Full Stack Security: Protecting Packaged Applications
    Blog
    Alert Logic Full Stack Security: Protecting Packaged Applications
    Learn More
  • The Case for Full Stack Cloud Security
    Blog
    The Case for Full Stack Cloud Security
    Learn More
  • What You Need to Know about Spectre and Meltdown
    Blog
    What You Need to Know about Spectre and Meltdown
    Learn More
  • Another Bucket Bites the Dust... But S3 Shouldn’t Be Your Soft Spot
    Blog
    Another Bucket Bites the Dust... But S3 Shouldn’t Be Your Soft Spot
    Learn More
  • Get Your Cloud Security in Shape for 2018
    Webinars | On-Demand
    Get Your Cloud Security in Shape for 2018
    Watch Now
  • SOC 2 Compliance Service Overview
    Datasheets
    SOC 2 Compliance Service Overview
    Learn More
  • Check Out the New and Improved Alert Logic Support Center
    Blog
    Check Out the New and Improved Alert Logic Support Center
    Learn More
  • Tony’s Take: The Top 5 Cloud Security Webinars of 2017
    Blog
    Tony’s Take: The Top 5 Cloud Security Webinars of 2017
    Learn More
  • Key Takeaways from AWS re:Invent 2017
    Blog
    Key Takeaways from AWS re:Invent 2017
    Learn More
  • Threat Monitoring, Detection & Response Report
    Industry Reports
    Threat Monitoring, Detection & Response Report
    Learn More
  • Effectively Respond to Amazon GuardDuty Findings using Cloud Insight Essentials Portal
    Blog
    Effectively Respond to Amazon GuardDuty Findings using Cloud Insight Essentials Portal
    Learn More
  • Announcing Alert Logic Managed Rule Groups for AWS WAF - Virtual Patches for WordPress
    Blog
    Announcing Alert Logic Managed Rule Groups for AWS WAF - Virtual Patches for WordPress
    Learn More
  • From Data to Action: Extending Amazon GuardDuty with Cloud Insight Essentials
    Webinars | On-Demand
    From Data to Action: Extending Amazon GuardDuty with Cloud Insight Essentials
    Watch Now
  • Maximize the Value of Amazon GuardDuty with Cloud Insight Essentials
    Blog
    Maximize the Value of Amazon GuardDuty with Cloud Insight Essentials
    Learn More
  • Identity and Access Management (IAM) Misconfigurations Top the List of Exposures in AWS Cloud Environments
    Blog
    Identity and Access Management (IAM) Misconfigurations Top the List of Exposures in AWS Cloud Environments
    Learn More
  • Alert Logic Included Among Cloud Workload Security Vendors by Forrester
    Blog
    Alert Logic Included Among Cloud Workload Security Vendors by Forrester
    Learn More
  • Adopting a Shared Security Model for Cloud
    Blog
    Adopting a Shared Security Model for Cloud
    Learn More
  • 9 Things to Know Before AWS re:Invent
    Blog
    9 Things to Know Before AWS re:Invent
    Learn More
  • Web Apps are Eating the World…and Exposing You to Risk
    Blog
    Web Apps are Eating the World…and Exposing You to Risk
    Learn More
  • Session m
    Case Studies
    SessionM
    Learn More
  • Cloud Security Doesn’t Have to be Complicated
    Blog
    Cloud Security Doesn’t Have to be Complicated
    Learn More
  • What You Need to Know to Tame ‘Bad Rabbit’ Ransomware
    Blog
    What You Need to Know to Tame ‘Bad Rabbit’ Ransomware
    Learn More
  • The Cost-Benefit Analysis of Security-as-a-Service
    Infographics
    The Cost-Benefit Analysis of Security-as-a-Service
    Learn More
  • Forrester Vendor Landscape Report
    Industry Reports
    Forrester Vendor Landscape Report
    Learn More
  • Get Ready for AWS re:Invent 2017 - Top Session Picks
    Blog
    Get Ready for AWS re:Invent 2017 - Top Session Picks
    Learn More
  • How to Talk about Cybersecurity in your Organization
    Blog
    How to Talk about Cybersecurity in your Organization
    Learn More
  • KRACK Wi-Fi Vulnerability Puts Almost All Wireless Traffic at Risk
    Blog
    KRACK Wi-Fi Vulnerability Puts Almost All Wireless Traffic at Risk
    Learn More
  • Achieving Compliance in Azure
    Webinars | On-Demand
    Achieving Compliance in Azure
    Watch Now
  • BC in the Cloud
    Case Studies
    BC in the Cloud
    Learn More
  • 2nd Watch Cloud Security Survey Finds Many Still Confused by Shared Responsibility Model
    Blog
    2nd Watch Cloud Security Survey Finds Many Still Confused by Shared Responsibility Model
    Learn More
  • Meeting the Pace of PCI DSS Compliance
    Blog
    Meeting the Pace of PCI DSS Compliance
    Learn More
  • Effective Cyber Attack Response Requires Planning and Preparation
    Blog
    Effective Cyber Attack Response Requires Planning and Preparation
    Learn More
  • Let He Who Is Without Web App Vulnerabilities Cast the First Stone at Equifax
    Blog
    Let He Who Is Without Web App Vulnerabilities Cast the First Stone at Equifax
    Learn More
  • GDPR Compliance in the EU Report
    Industry Reports
    GDPR Compliance in the EU Report
    Learn More
  • Overcoming PCI DSS Challenges While Driving Innovation
    Webinars | On-Demand
    Overcoming PCI DSS Challenges While Driving Innovation
    Watch Now
  • 6 Steps to PCI DSS Compliance in Multi-Cloud and Hybrid Environments
    Whitepapers
    6 Steps to PCI DSS Compliance in Multi-Cloud and Hybrid Environments
    Learn More
  • Tip 5 of Protecting Your SQL-based Cloud Environment - Intelligent Log Analysis
    Blog
    Tip 5 of Protecting Your SQL-based Cloud Environment - Intelligent Log Analysis
    Learn More
  • Your Threats May Be Persistent, But They’re Really Not That Advanced
    Blog
    Your Threats May Be Persistent, But They’re Really Not That Advanced
    Learn More
  • Shrinking Your Attack Surface: Preventing and Containing Multi-Stage Web Attacks
    Webinars | On-Demand
    Shrinking Your Attack Surface: Preventing and Containing Multi-Stage Web Attacks
    Watch Now
  • G-Cloud 9 and the Cyber Security of Public Sector Organizations
    Blog
    G-Cloud 9 and the Cyber Security of Public Sector Organizations
    Learn More
  • Tip 4 of Protecting Your SQL-based Cloud Environment - Identity and Access Management
    Blog
    Tip 4 of Protecting Your SQL-based Cloud Environment - Identity and Access Management
    Learn More
  • Tip 3 of Protecting Your SQL-based Cloud Environment - Web Application Firewalls & Intrusion Detection Systems
    Blog
    Tip 3 of Protecting Your SQL-based Cloud Environment - Web Application Firewalls & Intrusion Detection Systems
    Learn More
  • Brexit Won't Get UK Out of General Data Protection Regulation (GDPR) Compliance
    Blog
    Brexit Won't Get UK Out of General Data Protection Regulation (GDPR) Compliance
    Learn More
  • Make a Plan: Preview of the Azure Security Sessions at Microsoft Ignite
    Blog
    Make a Plan: Preview of the Azure Security Sessions at Microsoft Ignite
    Learn More
  • Tip 2 of Protecting Your SQL-based Cloud Environment - Vulnerability Scanning and Penetration Testing
    Blog
    Tip 2 of Protecting Your SQL-based Cloud Environment - Vulnerability Scanning and Penetration Testing
    Learn More
  • Rent-A-Center Relies on Alert Logic to Secure Their Workloads in AWS
    Blog
    Rent-A-Center Relies on Alert Logic's Cloud Security technology to Secure Their Workloads on AWS
    Learn More
  • Rent-A-Center
    Case Studies
    Rent-A-Center
    Learn More
  • Tip 1 of Protecting Your SQL-based Cloud Environment – Secure Coding PracticesTip 1 of Protecting Your SQL-based Cloud Environment - Secure Coding Practices
    Blog
    Tip 1 of Protecting Your SQL-based Cloud Environment - Secure Coding Practices
    Learn More
  • Fact Checking the Equifax Data Breach Story
    Blog
    Fact Checking the Equifax Data Breach Story
    Learn More
  • What is SQL Injection, and Why Is It Still Causing Issues?
    Blog
    What is SQL Injection, and Why Is It Still Causing Issues?
    Learn More
  • Assess Your GDPR Cloud Security Readiness
    Webinars | On-Demand
    Assess Your GDPR Cloud Security Readiness
    Watch Now
  • Buckle Up! Critical Flaw in Apache Struts Puts Web Applications at Risk
    Blog
    Buckle Up! Critical Flaw in Apache Struts Puts Web Applications at Risk
    Learn More
  • Tried and True - SQL Injection Still a Leading Method of Cyber Attack
    Blog
    Tried and True - SQL Injection Still a Leading Method of Cyber Attack
    Learn More
  • 3 Ways to Improve Security ROI with Alert Logic Security-as-a-Service
    Blog
    3 Ways to Improve Security ROI with Alert Logic Security-as-a-Service
    Learn More
  • Comprehensive Security Made Easy on AWS
    Webinars | On-Demand
    Comprehensive Security Made Easy on AWS
    Watch Now
  • Are We Saying Public Cloud is More Secure?  We Just Might Be
    Blog
    Are We Saying Public Cloud is More Secure? We Just Might Be
    Learn More
  • Understanding Your Cloud Attack Surface: Insights from the 2017 Cloud Security Report
    Webinars | On-Demand
    Understanding Your Cloud Attack SurfaceInsights from the 2017 Cloud Security Report
    Watch Now
  • Preparing for Cyber Attacks... Expect the Unexpected
    Webinars | On-Demand
    Preparing for Cyber Attacks... Expect the Unexpected
    Watch Now
  • Microsoft Inspire 2017 Recap: Cloud Security Highlights
    Blog
    Did you get all that? Recap of Cloud Security announcements at Microsoft Inspire 2017
    Learn More
  • Lower Your Web Application Risk with Complete Visibility
    Blog
    Lower Your Web Application Risk with Complete Visibility
    Learn More
  • Integrating Security and Compliance within Fintech
    Blog
    Integrating Security and Compliance within Fintech
    Learn More
  • Emergent PetrWrap Variant Analyzed: Internet Propagation and Recovery of Non-NTFS Victims
    Blog
    Emergent PetrWrap Variant Analyzed: Internet Propagation and Recovery of Non-NTFS Victims
    Learn More
  • The Curious Case of Alexsey Belan and 1.2 Billion Compromised Accounts
    Blog
    The Curious Case of Alexsey Belan and 1.2 Billion Compromised Accounts
    Learn More
  • Web App Attacks: Stories from the SOC
    Webinars | On-Demand
    Web App Attacks: Stories from the SOC
    Watch Now
  • The Total Economic Impact of Alert Logic Security-as-a-Service
    Industry Reports
    The Total Economic Impact of Alert Logic Security-as-a-Service
    Learn More
  • WWE Breach Highlights Need for Better Cloud Security
    Blog
    WWE Breach Highlights Need for Better Cloud Security
    Learn More
  • Web App Attacks: Hacker Methodologies and Remediation Strategies
    Webinars | On-Demand
    Web App Attacks: Hacker Methodologies and Remediation Strategies
    Watch Now
  • Most Powerful Predictor of Cloud Security Posture? Your Application Stack.
    Blog
    Most Powerful Predictor of Cloud Security Posture? Your Application Stack.
    Learn More
  • Wealth Wizards
    Case Studies
    Wealth Wizards
    Learn More
  • Why The Web Apps You're Worried About Least Could Be Your Most Critical Exposure.
    Webinars | On-Demand
    Why The Web Apps You're Worried About Least Could Be Your Most Critical Exposure.
    Watch Now
  • Hillary's Blinds
    Case Studies
    Hillary's Blinds
    Learn More
  • PetrWrap Ransomware Brings More Tears
    Blog
    PetrWrap Ransomware Brings More Tears
    Learn More
  • Recap of Cloud Security Summit with Microsoft Azure
    Blog
    Recap of Cloud Security Summit with Microsoft Azure
    Learn More
  • Is Your Security Keeping Pace With Your Cloud Initiatives?
    Blog
    Is Your Security Keeping Pace With Your Cloud Initiatives?
    Learn More
  • Your Business Apps Are Under Attack: Are You Really Protected?
    Webinars | On-Demand
    Your Business Apps Are Under Attack: Are You Really Protected?
    Watch Now
  • Hope is Not Lost - Implementing Security in Cloud Adoption
    Blog
    Hope is Not Lost - Implementing Security in Cloud Adoption
    Learn More
  • Security Agility: Enabling Innovation
    Webinars | On-Demand
    Security Agility: Enabling Innovation
    Watch Now
  • Better Detection: Keeping Pace With The Changing Threat Landscape
    Webinars | On-Demand
    Better Detection: Keeping Pace With The Changing Threat Landscape
    Watch Now
  • The Good, The Bad & The Ugly of Threat Detection
    Webinars | On-Demand
    The Good, The Bad & The Ugly of Threat Detection
    Watch Now
  • Protecting Web Applications in AWS
    Webinars | On-Demand
    Protecting Web Applications in AWS
    Watch Now
  • Journey To The Cloud: Jumping The Invisible Hurdles And The Cultural Journey
    Webinars | On-Demand
    Journey To The Cloud: Jumping The Invisible Hurdles And The Cultural Journey
    Watch Now