Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Hunt for cloud session anomalies with Cloud SIEM

In today’s cloud-native world, systems are usually accessed by users from multiple devices and in various geographic locations. Anyone who has tried to operationalize an impossible travel type alert for cloud resources will understand the myriad nuances and gotchas involved in such an endeavor. A user may be accessing a cloud resource from a mobile device that is tied to a carrier network well away from their normal geographic location.

Guarding the game: securing digital playgrounds

Imagine needing to stop a playoff game because viewers were actively impacting the sport, helping players catch impossible passes or score points they never should have gotten. That’s the equivalent of what happened when an Apex Legends hack during the North American finals interrupted the tournament and raised cybersecurity concerns for everyone involved. With global esports a billion-dollar industry, and competitive video gaming in general worth much more than that, this has a serious impact.

DevSecOps in an AI world requires disruptive log economics

We’ve been talking about digital transformation for years (or even decades?), but the pace of evolution is now being catapulted forward by AI. This rapid change and innovation creates and relies upon exponential data sets. And while technology is rapidly evolving to manage and maintain these massive data sets, legacy pricing models based on data ingest volume are lagging behind, making it economically unsustainable.

Cloud security vs. traditional security

Data protection principles are the same whether your data sits in a traditional on-premises data center or a cloud environment. However, the way you apply those principles is quite different when it comes to cloud security vs. traditional security. Moving data to the cloud – whether it's a public cloud like AWS, a private cloud or hybrid cloud — introduces new attack surfaces, threats and challenges, so you need to approach security in a new way.

No-code vs. low-code and near-no-code security automation

It seems that “no-code” is a term we hear more often in the security automation context these days. And this is especially true because automation has become one of the major talking points in cybersecurity. How is no-code automation implemented in cybersecurity? How do no-code and Sumo Logic automation compare to each other? We’ll discuss all these questions in the following sections.

Protecting identities with the Sumo Logic platform

Today’s cyber threat landscape necessitates that we, as defenders of the enterprise, place identities at the center of our detection, prevention and response efforts. Indeed, threat actor tactics and techniques observed in the wild demonstrate that credential theft presents a large risk to the confidentiality, integrity and availability of our systems - be they on premises or in the cloud.

NIS2: Prepping your cybersecurity plan

If you are an organisation that operates or does business in the European Union (EU), then your team is likely preparing for the NIS2 Directive, an EU-wide legislation on cybersecurity. It provides legal measures to boost the overall level of cybersecurity in the EU and goes into effect on October 17, 2024. However, according to a survey by cybersecurity firm Sailpoint (and a Sumo Logic customer), only 34% of organisations in the UK, France, and Germany are prepared for NIS2.

Secure your AWS environment faster with Sumo Logic's AWS Built-in Competency

In the fast-paced world of cloud-based attacks, staying ahead of the curve with cloud-native security solutions is paramount. Sumo Logic, a leading name in the field, has taken a significant leap forward by embracing AWS Built-in and becoming a launch partner for the AWS Built-in Competency. Let’s explore how Sumo Logic and AWS collaborated to define a new way to deliver an integrated solution that expands upon the requirements of AWS Native Service integrations across foundational cloud domains.

Making the cloud the safest place to compute: Sumo Logic Cloud Infrastructure Security for AWS

The landscape of cloud computing has evolved significantly over the years, transforming how businesses operate and innovate. This transformation has brought new challenges, especially in security. The growing adoption of cloud services, microservices architecture, and the shared responsibility model of cloud vendors has ushered in a need for robust security solutions that consolidate risk and threat data across cloud environments.