AlienVault

Hybrid Cloud Security, Part II: New Security Challenges Take Shape in the Cloud

This post was originally published here by Danielle Russell. When you stare at the clouds long enough, you begin to see things that weren’t there before. There’s a rabbit. Or, maybe it’s a duck. A gust of wind and suddenly, an elephant shapeshifts into a flying saucer. If you look at public cloud infrastructure long enough, […]

Certified Ethical Hacker (CEH): What It Is, What It Isn’t, and Why It’s Important

This post was originally published here by Jonathan Gibson. The Certified Ethical Hacker CEH) certification is more than just another paper to add to your collection. While one could argue that it’s just another multiple choice exam, there is no mistaking the value of the knowledge you learn from studying for and then gaining this […]

Role of Cyber Threat Intelligence Analysts in an Organization

Threat intelligence is evidence-based information, including context, mechanisms, indicators of compromise, implications and actionable advice, about existing or emerging hazards to assets. Threat intelligence allows IT professionals to make decisions and take action accordingly. Historically, intelligence tactics, techniques, and procedures as well as various types of intelligence operations existed long before cyberspace was conceived. Intelligence […]

UX Design: An Overlooked Aspect of Endpoint Security

People in information security know to heed the advice of Bruce Schneier. What we often forget to do, however, is heed the advice of Don Norman, who is considered to be the father of User Experience design. In fact, when Apple hired Norman in 1993 as an Apple Fellow and User Experience Architect he was probably the […]

Top 12 AlienVault Blogs of 2016

Wow, 2016 was quite a year, which provided the AlienVault team and our guest bloggers with plenty of topics to blog on from InfoSec best practices to OceanLotus to Reverse Engineering to building a home malware lab! We are looking forward to providing more educational and useful blogs in 2017. As in 2016, we welcome […]

GoldenEye Ransomware: Shaken, Not Stirred – Notes from the Underground

What do action, adventure, cool gadgets, Vodka martinis—shaken not stirred—and ransomware all have in common? One word – GoldenEye. For my fellow Gen Xers, you probably remember this iconic James Bond film starring Pierce Brosnan as 007. I sure do. It was one of the best James Bond films ever made. The film involved an […]

Ransomware: Hype and Prevention Strategies

One of the biggest digital security threats that businesses, governments, and consumers all face is ransomware. What makes ransomware especially offensive is its capacity to inflict extensive damage in an incredibly short space of time, and the difficulties in remediating an infection. Ransomware is a type of malware that deliberately interferes with the standard operation […]

Ransomware: Hype and Prevention Strategies

One of the biggest digital security threats that businesses, governments, and consumers all face is ransomware. What makes ransomware especially offensive is its capacity to inflict extensive damage in an incredibly short space of time, and the difficulties in remediating an infection. Ransomware is a type of malware that deliberately interferes with the standard operation […]

Hybrid Cloud Security, Part One: Familiar Threats in an Unfamiliar Territory

Cloud computing is rapidly becoming a must-have for organizations of all shapes and sizes, making hybrid cloud security a big concern—and often a big question mark—for IT security professionals. A recent IDC report predicted that cloud adoption in organizations will grow 45% by 2018. This prediction is not lost on cyber-attackers, who are constantly adapting their attack […]

Money, Happiness, & Breaches: Views from Spiceworks IT Professionals

It is well-known that information technology (IT) is a high-stress field, filled with overworked employees trying to do the work of multiple employees. The skills shortage continues to be a major concern within the IT security sector, and until this situation is resolved, IT security will likely retain its reputation as a field that demands […]

AlienVault simplifies the way organizations detect and respond to today’s ever evolving threat landscape. Our unique and award-winning approach, trusted by thousands of customers, combines the essential security controls of our all-in-one platform, AlienVault Unified Security Management, with the power of AlienVault’s Open Threat Exchange, the world’s largest crowd-sourced threat intelligence community, making effective and affordable threat detection attainable for resource-constrained IT teams.
Share this page

Sign Up for Your Weekly
Cybersecurity Insiders Newsletter

Sign up for the free newsletter! Join thousands of cybersecurity professionals to receive the latest news and updates from the world of information security.

Thank You For Signing Up!