How to secure a Kubernetes cluster

This post was originally published by DAVID BISSON. More and more organizations are adopting Kubernetes, but they’re encountering security challenges along the way. In the fall 2020 edition of its “State of Container and Kubernetes Security” report, for instance, StackRox found that nearly 91% of surveyed organizations had adopted Kubernetes, with a majority (75%) of participants revealing […]

AT&T to buy Cyber Threat detection company Alienvault

AT&T has released an official press statement yesterday which says that it has acquired San Mateo based Cyber Threat Detection Company ‘Alienvault’. The financial details of the deal are yet to be disclosed, but sources say that the telecommunication giant grabbed the firm for a double-digit figure in millions. From the beginning of this year, […]

9-Step GDPR Compliance Guide [Download]

The GDPR deadline is quickly approaching, are you prepared? Check out this 9-Step GDPR Guide to learn more – The GDPR, or General Data Privacy Regulation, goes into effect on May 25th and requires organizations to maintain a plan to detect a data breach, regularly evaluate the effectiveness of security practices, and document evidence […]

GDPR Compliance Checklist: A 9-Step Guide

Download the GDPR Compliance Checklist here. The GDPR, or General Data Privacy Regulation, will come into force in May of 2018 and requires organizations to maintain a plan to detect a data breach, regularly evaluate the effectiveness of security practices, and document evidence of compliance. If you don’t already have the required security tools and […]

AlienVault USM Anywhere

We reviewed AlienVault® USM Anywhere™ and were impressed with the many robust threat monitoring, detection, and incident response capabilities packed into a single platform. AlienVault is a superb choice for organizations of all sizes but especially those with limited resources and in-house security expertise that are looking for comprehensive security management at an affordable price. […]

Three Steps to Hiring a Great Security Lead

Are you thinking about adding more senior resources to your security team? It may be that you are looking to create your first stand-alone security role or maybe you’re prioritizing security experience as a desired skill in your newest senior IT hire. If so, you aren’t alone. Recently, a workforce survey done by the International Information System […]

New Law in New York State Could Shape Cyber Security Across the US

This post was originally published here by Bob Covello . The New York State Department of Financial Services has adopted a new cyber security regulation for all banking, insurance, and financial institutions that conduct business in New York State. The new law is in effect as of 01 March, 2017. Firms that have more than 10 […]

GhostAdmin: The Invisible Data Thief – Notes from the Underground

This post was originally published here by Julia Kisielius. Data theft is a major threat to businesses in today’s economy. With large corporations like Arby’s, Popeye’s, and Intercontinental Hotels all reporting breaches since the beginning of this year alone, it’s essential for IT professionals to keep an eye out for emerging threats that target valuable […]

Demystifying Network Isolation and Micro-Segmentation

This post was originally published here by Alissa Knight . A project management approach to designing, implementing, and operationalizing network isolation and micro-segmentation Network segmentation (often referred to as network isolation) is the concept of taking your network and creating silos within it called VLANs (virtual local area networks) that separates assets in the networked environment […]

Beginner’s Guide to Open Source Incident Response Tools and Resources

This post was originally published here by James Fritz. Any discussion of incident response deserves a close look at the tools that you’ll need for effective incident detection, triage, containment and response. In this post, you’ll read about the best open source tools for each function, we’ll share resources for how to learn how and […]

AlienVault simplifies the way organizations detect and respond to today’s ever evolving threat landscape. Our unique and award-winning approach, trusted by thousands of customers, combines the essential security controls of our all-in-one platform, AlienVault Unified Security Management, with the power of AlienVault’s Open Threat Exchange, the world’s largest crowd-sourced threat intelligence community, making effective and affordable threat detection attainable for resource-constrained IT teams.
Share this page