.

AlienVault

Banner Year at AlienVault – a Recap from CEO

This post was originally published here by Barmak Meftah.I’m thrilled to announce that 2016 was another year of hypergrowth for AlienVault! A lot has...

IT Security Party Tricks

This post was originally published here by Javvad Malik.Cyber is on the tip of everyone’s tongue, from the news to the local shopkeeper. Everyone...

How Does Whonix Make Kali Linux Anonymous & How to Prevent...

This post was originally published here by  Irfan Shakeel.The Internet was not designed with anonymity in mind, but things have changed. Anonymity has become...

Hybrid Cloud Security, Part II: New Security Challenges Take Shape in...

This post was originally published here by Danielle Russell.When you stare at the clouds long enough, you begin to see things that weren’t there before....

Certified Ethical Hacker (CEH): What It Is, What It Isn’t, and...

This post was originally published here by Jonathan Gibson. The Certified Ethical Hacker CEH) certification is more than just another paper to add to your...

Role of Cyber Threat Intelligence Analysts in an Organization

Threat intelligence is evidence-based information, including context, mechanisms, indicators of compromise, implications and actionable advice, about existing or emerging hazards to assets. Threat intelligence...

UX Design: An Overlooked Aspect of Endpoint Security

People in information security know to heed the advice of Bruce Schneier. What we often forget to do, however, is heed the advice of Don Norman,...

Top 12 AlienVault Blogs of 2016

Wow, 2016 was quite a year, which provided the AlienVault team and our guest bloggers with plenty of topics to blog on from InfoSec...

GoldenEye Ransomware: Shaken, Not Stirred – Notes from the Underground

What do action, adventure, cool gadgets, Vodka martinis—shaken not stirred—and ransomware all have in common? One word – GoldenEye. For my fellow Gen Xers,...

Ransomware: Hype and Prevention Strategies

One of the biggest digital security threats that businesses, governments, and consumers all face is ransomware. What makes ransomware especially offensive is its capacity...

https://www.alienvault.com/

AlienVault simplifies the way organizations detect and respond to today’s ever evolving threat landscape. Our unique and award-winning approach, trusted by thousands of customers, combines the essential security controls of our all-in-one platform, AlienVault Unified Security Management, with the power of AlienVault’s Open Threat Exchange, the world’s largest crowd-sourced threat intelligence community, making effective and affordable threat detection attainable for resource-constrained IT teams.
Share this page

Sign Up for Your Weekly
Cybersecurity Insiders Newsletter

Sign up for the free newsletter! Join thousands of cybersecurity professionals to receive the latest news and updates from the world of information security.

Thank You For Signing Up!