Blog
Supply Chain Compromise: The Risks You Need to Know
Tue, 04/11/2023
Increased collaboration exposes you to more than you may realize. Discover why and how supply chain compromise is so common, before preparing a response.
Blog
A Day in the Life of a SOC Team
Thu, 04/06/2023
Managed detection and response (MDR) would be nothing without a SOC (security operations center). These are the people who make Alert Logic's MDR services so dependable. It’s time you met them.
Blog
3 Tips to Strengthen AWS Container Security
Thu, 04/06/2023
Containers are fundamental to swift, reliable AWS deployment. So, how can you strengthen AWS container security?
Blog
Exit Points and Why Menu Security Isn’t Enough
By Robin Tatam on Wed, 05/30/2018
How do interfaces like FTP side-step IBM i menu security and give users uncontrolled data access through exit points? Robin Tatam explains in this short video.
Blog
How Exit Programs Make the Greatest Impact on IBM i Security
By Robin Tatam on Tue, 03/28/2017
What do exit points have to do with cybersecurity? How do exit programs work? Robin Tatam provides a clear explanation in this video.
Blog
Cracking the Problem of Endpoint Security
By Robin Tatam on Fri, 03/24/2017
Endpoint security has been a hot topic in the technology and corporate sectors for a few years. Especially with the emergence of bring-your-own-device practices, it has become even more critical to put safeguards in place to ensure the security of sensitive information.