AlienVault

Role of Cyber Threat Intelligence Analysts in an Organization

Threat intelligence is evidence-based information, including context, mechanisms, indicators of compromise, implications and actionable advice, about existing or emerging hazards to assets. Threat intelligence allows IT professionals to make decisions and take action accordingly. Historically, intelligence tactics, techniques, and procedures as well as various types of intelligence operations existed long before cyberspace was conceived. Intelligence […]

UX Design: An Overlooked Aspect of Endpoint Security

People in information security know to heed the advice of Bruce Schneier. What we often forget to do, however, is heed the advice of Don Norman, who is considered to be the father of User Experience design. In fact, when Apple hired Norman in 1993 as an Apple Fellow and User Experience Architect he was probably the […]

Top 12 AlienVault Blogs of 2016

Wow, 2016 was quite a year, which provided the AlienVault team and our guest bloggers with plenty of topics to blog on from InfoSec best practices to OceanLotus to Reverse Engineering to building a home malware lab! We are looking forward to providing more educational and useful blogs in 2017. As in 2016, we welcome […]

GoldenEye Ransomware: Shaken, Not Stirred – Notes from the Underground

What do action, adventure, cool gadgets, Vodka martinis—shaken not stirred—and ransomware all have in common? One word – GoldenEye. For my fellow Gen Xers, you probably remember this iconic James Bond film starring Pierce Brosnan as 007. I sure do. It was one of the best James Bond films ever made. The film involved an […]

Ransomware: Hype and Prevention Strategies

One of the biggest digital security threats that businesses, governments, and consumers all face is ransomware. What makes ransomware especially offensive is its capacity to inflict extensive damage in an incredibly short space of time, and the difficulties in remediating an infection. Ransomware is a type of malware that deliberately interferes with the standard operation […]

Ransomware: Hype and Prevention Strategies

One of the biggest digital security threats that businesses, governments, and consumers all face is ransomware. What makes ransomware especially offensive is its capacity to inflict extensive damage in an incredibly short space of time, and the difficulties in remediating an infection. Ransomware is a type of malware that deliberately interferes with the standard operation […]

Hybrid Cloud Security, Part One: Familiar Threats in an Unfamiliar Territory

Cloud computing is rapidly becoming a must-have for organizations of all shapes and sizes, making hybrid cloud security a big concern—and often a big question mark—for IT security professionals. A recent IDC report predicted that cloud adoption in organizations will grow 45% by 2018. This prediction is not lost on cyber-attackers, who are constantly adapting their attack […]

Money, Happiness, & Breaches: Views from Spiceworks IT Professionals

It is well-known that information technology (IT) is a high-stress field, filled with overworked employees trying to do the work of multiple employees. The skills shortage continues to be a major concern within the IT security sector, and until this situation is resolved, IT security will likely retain its reputation as a field that demands […]

Positive Password Psychology

There was an interesting study conducted some years ago. In that study, young participants were asked a series of questions. The ostensible purpose of the study was to find out the answers to the questions. As with most of those cheeky study authors, the real purpose was to measure the effect of “behavioral priming”. The […]

Ransomware+: A New Shade of Evil

Ransomware has become an ever growing topic of conversation and concern in the security community during the last several years. According to the ZDNet article earlier this year — Ransomware is now the biggest cybersecurity threat — Danny Palmer asserts that ransomware has replaced the Advanced Persistent Threat (APT) as the most problematic cyber threat. He’s not […]

AlienVault simplifies the way organizations detect and respond to today’s ever evolving threat landscape. Our unique and award-winning approach, trusted by thousands of customers, combines the essential security controls of our all-in-one platform, AlienVault Unified Security Management, with the power of AlienVault’s Open Threat Exchange, the world’s largest crowd-sourced threat intelligence community, making effective and affordable threat detection attainable for resource-constrained IT teams.
Share this page