Planning for an InfoSec Conference

This post was originally published here by Javvad Malik. I wasted many an early year going to InfoSec conferences and security events only to find them useless. Well, they weren’t totally useless, I’d often come back with a bag full of goodies that more often than not included stress balls, USB drives, and some stickers. My […]

Are Windows Registry Fixers Safe?

This post was originally published here by Kim Crawley. Before I got into cybersecurity, I spent years as a technical support agent for Windows end users of Windstream, an American ISP. Although Windstream is an ISP, they also offered a general Windows client OS remote support service for their predominantly rural customers. Many of my […]

Great MSSP Advice from a Seasoned InfoSec Veteran

This post was originally published here by Sam Tormey. I spoke with security expert Steve Wood about daily life as a security analyst. He provided me with general advice for MSSPs who are getting started, perhaps with a technology provider like AlienVault. Steve has been in InfoSec for 16 years now and has worked all over the […]

Managing Your Security Appetite

This post was originally published here by Jack Danahy. Make the best use of security budget windfalls when they happen In a given year, 90% of companies are going to get hacked or DDoSed. It might be ransomware, a data breach, or a denial of service, but damage is occurring and everybody is worried. As a result, three-quarters […]

Introducing USM Anywhere: Unified Security Management in the Cloud for the Cloud

This post was originally published here by Denny LeCompte. In case you haven’t heard yet, we’ve just launched a brand-new product—AlienVault USM Anywhere™—the latest product to leverage AlienVault’s unique, unified approach to security management. A cloud-based security monitoring platform, USM Anywhere combines the essential security capabilities needed for effective threat detection, incident response, and compliance […]

Banner Year at AlienVault – a Recap from CEO

This post was originally published here by Barmak Meftah. I’m thrilled to announce that 2016 was another year of hypergrowth for AlienVault! A lot has changed both from a company perspective and in the overall threat landscape since I joined AlienVault in 2011. Attacks are getting more frequent, sophisticated and difficult to detect, while attack […]

IT Security Party Tricks

This post was originally published here by Javvad Malik. Cyber is on the tip of everyone’s tongue, from the news to the local shopkeeper. Everyone has heard of it, and many hold strong opinions on technology, security, and hacking. The dangers of working in technology or security have been well documented. Most of us have […]

How Does Whonix Make Kali Linux Anonymous & How to Prevent It?

This post was originally published here by  Irfan Shakeel. The Internet was not designed with anonymity in mind, but things have changed. Anonymity has become a necessary and legitimate objective in many applications (browsing the internet, chatting, sending instant messages etc.). The main reason for this is that even if traffic is encrypted, only the […]

Hybrid Cloud Security, Part II: New Security Challenges Take Shape in the Cloud

This post was originally published here by Danielle Russell. When you stare at the clouds long enough, you begin to see things that weren’t there before. There’s a rabbit. Or, maybe it’s a duck. A gust of wind and suddenly, an elephant shapeshifts into a flying saucer. If you look at public cloud infrastructure long enough, […]

Certified Ethical Hacker (CEH): What It Is, What It Isn’t, and Why It’s Important

This post was originally published here by Jonathan Gibson. The Certified Ethical Hacker CEH) certification is more than just another paper to add to your collection. While one could argue that it’s just another multiple choice exam, there is no mistaking the value of the knowledge you learn from studying for and then gaining this […]

AlienVault simplifies the way organizations detect and respond to today’s ever evolving threat landscape. Our unique and award-winning approach, trusted by thousands of customers, combines the essential security controls of our all-in-one platform, AlienVault Unified Security Management, with the power of AlienVault’s Open Threat Exchange, the world’s largest crowd-sourced threat intelligence community, making effective and affordable threat detection attainable for resource-constrained IT teams.
Share this page

Sign Up for Your Weekly
Cybersecurity Insiders Newsletter

Sign up for the free newsletter! Join thousands of cybersecurity professionals to receive the latest news and updates from the world of information security.

Thank You For Signing Up!