.

AlienVault

BYOD security explained: what is a BYOD policy?

This blog was written by a third party author What is bring your own device (BYOD)? Bring your own device (BYOD) describes the practice of using...

Zero Trust Architecture explained

This blog was written by a third party author. With the increase in frequency, sophistication, and cost of cyberattacks, the global focus on cybersecurity is...

Cyber safety tips for virtual events

This blog was written by an independent guest blogger. Since the start of the Covid-19 pandemic, the use of video chat software like Zoom has...

Stories from the SOC – Cloud and On-site Protection

This blog was jointly authored by Josue Gomez Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and...

Inside the Infographic: “Cybersecurity by the Numbers”

The ongoing cybercrime epidemic has triggered a cybersecurity calls to arms, as organizations around the world are looking for some 3.5 million skilled workers...

What is DDoS mitigation and how does it work?

This blog was written by a third party author. Distributed denial of service (DDoS) attacks are a favorite method for attackers to disrupt or debilitate...

Data privacy and data governance fundamentals of the NIST Privacy Framework

As of January 16, the National Institute for Standards and Technology (NIST) published the first version of their privacy framework. For those of you...

What is mobile device management? MDM explained

This blog was written by a third party author. Not too long ago, the desktop computer was the primary computing device for enterprise employees. With...

Dark Web monitoring and scanning explained

This blog was written by a third party author. Shady deals often occur in darkness – criminal activities require secrecy to cloak their illicit nature....

Security awareness training explained

This blog was written by a third party author. Cyberattacks are an almost daily occurrence for many IT and security professionals, and there are a...

https://www.alienvault.com/

AlienVault simplifies the way organizations detect and respond to today’s ever evolving threat landscape. Our unique and award-winning approach, trusted by thousands of customers, combines the essential security controls of our all-in-one platform, AlienVault Unified Security Management, with the power of AlienVault’s Open Threat Exchange, the world’s largest crowd-sourced threat intelligence community, making effective and affordable threat detection attainable for resource-constrained IT teams.
Share this page

Sign Up for Your Weekly
Cybersecurity Insiders Newsletter

Sign up for the free newsletter! Join thousands of cybersecurity professionals to receive the latest news and updates from the world of information security.

Thank You For Signing Up!