.

AlienVault

Three Steps to Hiring a Great Security Lead

Are you thinking about adding more senior resources to your security team? It may be that you are looking to create your first stand-alone...

New Law in New York State Could Shape Cyber Security Across...

This post was originally published here by Bob Covello .The New York State Department of Financial Services has adopted a new cyber security regulation for...

GhostAdmin: The Invisible Data Thief – Notes from the Underground

This post was originally published here by Julia Kisielius.Data theft is a major threat to businesses in today’s economy. With large corporations like Arby’s,...

Demystifying Network Isolation and Micro-Segmentation

This post was originally published here by Alissa Knight .A project management approach to designing, implementing, and operationalizing network isolation and micro-segmentationNetwork segmentation (often referred...

Beginner’s Guide to Open Source Incident Response Tools and Resources

This post was originally published here by James Fritz.Any discussion of incident response deserves a close look at the tools that you’ll need for...

Planning for an InfoSec Conference

This post was originally published here by Javvad Malik.I wasted many an early year going to InfoSec conferences and security events only to find them...

Are Windows Registry Fixers Safe?

This post was originally published here by Kim Crawley.Before I got into cybersecurity, I spent years as a technical support agent for Windows end...

Great MSSP Advice from a Seasoned InfoSec Veteran

This post was originally published here by Sam Tormey.I spoke with security expert Steve Wood about daily life as a security analyst. He provided me...

Managing Your Security Appetite

This post was originally published here by Jack Danahy.Make the best use of security budget windfalls when they happenIn a given year, 90% of companies...

Introducing USM Anywhere: Unified Security Management in the Cloud for the...

This post was originally published here by Denny LeCompte.In case you haven’t heard yet, we’ve just launched a brand-new product—AlienVault USM Anywhere™—the latest product...

https://www.alienvault.com/

AlienVault simplifies the way organizations detect and respond to today’s ever evolving threat landscape. Our unique and award-winning approach, trusted by thousands of customers, combines the essential security controls of our all-in-one platform, AlienVault Unified Security Management, with the power of AlienVault’s Open Threat Exchange, the world’s largest crowd-sourced threat intelligence community, making effective and affordable threat detection attainable for resource-constrained IT teams.
Share this page

Sign Up for Your Weekly
Cybersecurity Insiders Newsletter

Sign up for the free newsletter! Join thousands of cybersecurity professionals to receive the latest news and updates from the world of information security.

Thank You For Signing Up!