Blog
Supply Chain Compromise: The Risks You Need to Know
Tue, 04/11/2023
Increased collaboration exposes you to more than you may realize. Discover why and how supply chain compromise is so common, before preparing a response.
Blog
A Day in the Life of a SOC Team
Thu, 04/06/2023
Managed detection and response (MDR) would be nothing without a SOC (security operations center). These are the people who make Alert Logic's MDR services so dependable. It’s time you met them.
Blog
3 Tips to Strengthen AWS Container Security
Thu, 04/06/2023
Containers are fundamental to swift, reliable AWS deployment. So, how can you strengthen AWS container security?
Blog
What is DORA and How Can You Achieve Compliance?
Tue, 02/28/2023
When searching online for the new EU Regulation for strengthening the cybersecurity of financial entities and their third-party IT providers, called Digital Operational Resilience Act or DORA, it is almost certain that you will stumble upon Dora the Explorer, the famous kids’ animation.
Blog
IT & COVID-19: The 3 Phases of Supporting a Remote Workforce
By David Zacharias on Tue, 06/09/2020
Coronavirus (COVID-19) has brought about unprecedented times. Let us help you maintain business as (sort of) usual.
Blog
Staying Ahead of the Curve: Implementing Privileged Access Management Solutions
Fri, 03/22/2019
Find out why Privileged Access Management (PAM) has become such a priority, and why your organization should stay ahead of the curve and adopt a PAM solution.
Blog
A Precarious Balance: Privileged Users and The Cloud
By Bob Erdman on Tue, 11/20/2018
When it comes to privileged users, do we maintain security at the cost of productivity, or do we increase productivity at the cost of security?
Blog
The Shared Responsibility of Cloud Security
By Bob Erdman on Fri, 10/26/2018
The agreement that cloud security is a shared responsibility between cloud providers and cloud users has now firmly taken hold. How those responsibilities shake out, however, is an ongoing conversation.
Blog
Are Employees Undermining Your Data Breach Defenses from the Inside?
Fri, 06/29/2018
The latest Verizon Data Breach Report provides a deeper understanding of the internal threats today's organizations face.
Case Study
Victaulic makes Short Work of Ad Hoc Queries with Surveyor/400
Ad hoc queries and reports are the bane of many IT departments. The need to churn out frequent, one-off, "must have" data queries for users can be a significant drain on developers' time. Users can't be blamed for the numerous impromptu requests. Customer service, continuous improvement, and the maintenance of competitive advantage demand that business people regularly look at data in innovative...