CLOUD DEFENDER SIEM

Security has typically been a technology-driven area. If a company puts up a website, the network security element is fulfilled by intrusion-detection and -prevention services that are sold separately from Web application firewalls (WAFs), which provid…

CLOUD SECURITY REPORT

This year’s report also features an additional research tool: Cloud Honeypots. Using honeypots deployed in public cloud infrastructures around the world, Alert Logic researchers have gained valuable insights related to attack trends in the cloud….

PCI DSS 3.0 Guidebook

Compliance with data security standards can bring major benefits to businesses of all sizes, while failure to comply can have serious and long-term negative consequences.  To ensure you have the information you need to comply with PCI DSS 3.0 stan…

Team Building Without Time Wasting

A common challenge faced by today’s leaders is the necessity of building teams in an environment of rapid change with limited resources. The process of re-engineering and streamlining, when coupled with in­creased demand for services, has led…