AlienVault

Jun 4, 2018
2007
San Mateo, CA, USA
Dec 10, 2018   |  By Kate Brew
I got curious about what kind of people are most desired in a Security Operations Center (SOC). I wondered how accepting InfoSec blue teamers would be to having a team member with a great attitude and system administration or network management skills, versus someone with deep InfoSec knowledge and skills. So I did a poll on Twitter to learn more.
Dec 7, 2018   |  By Josh Lake
Password security has always been a challenge. Brute force attacks are constantly getting more powerful, but they aren’t the only threat you have to worry about. A range of password stealing malware continues to grow in popularity. One example, Agent Tesla, has seen its detection rate grow 100% in just three months, according to data from LastLine. Despite this rapid growth, Agent Tesla is far from the most popular.
Dec 5, 2018   |  By Javvad Malik
Businesses rely on technology more today than they ever have in the past. In fact, many business models are built entirely around a technology which, if disrupted, could spell ruin. A traditional business with a brick and mortar presence is probably better-placed to withstand an extensive online disruption or outage.
Nov 27, 2018   |  By Chuck Brooks
The cognitive tools/technologies of machine learning (ML) and artificial intelligence (AI) are impacting the cybersecurity ecosystem in a variety of ways. Applied AI machine learning and natural language processing are being used in cybersecurity by both the private and public sectors to bolster situational awareness and enhance protection from cyber threats. The algorithmic enablers that make ML and AI pinnacles of cybersecurity are automation and orchestration.
Nov 26, 2018   |  By Julia Kisielius
Viva Las Vegas! We aliens have landed at AWS re:Invent 2018 (Booth #1506), bringing phenomenal threat detection, response, and compliance to the AWS cloud. As I gear up for a full day of live product demos, I thought I’d take a moment to highlight some of the ways in which AlienVault is delivering phenomenal security to our customers’ AWS environments and beyond.
Oct 22, 2018   |  By AlienVault
The Insider’s Guide to Incident Response gives you an in-depth look at the fundamental strategies of efficient and effective incident response for security teams that need to do more with less in today’s rapidly changing threat landscape.
Oct 22, 2018   |  By AlienVault
Phenomenal security. Phenomenal partnership. At AlienVault, we understand that customers rely on your expertise to deliver world-class security solutions specifically designed to protect their unique business. We also know that vetting partnerships opportunities with security vendors is a critical component to delivering those outcomes.
Oct 1, 2018   |  By AlienVault
Get All 5 Chapters of AlienVault’s How to Build a Security Operations Center (On a Budget) in 1 eBook! You'll get an in-depth look at how organizations with limited resources can set up a successful operations center for monitoring, detecting, containing, and remediating IT threats across applications, devices, systems, networks, and locations.
Oct 1, 2018   |  By AlienVault
As organizations around the world shift their workloads to Amazon Web Services (AWS) and other popular cloud infrastructure-as-a-service (IaaS) providers, concerns about cloud security continue to rise. According to a 2018 Cloud Security Report from Cybersecurity Insiders, 91% of respondents are concerned about cloud security, an increase of 11% over last year’s report.
Sep 1, 2018   |  By AlienVault
Criminal organizations and hackers increasingly perceive regional banks and credit unions as attractive targets. That’s why we’ve created this primer—to help IT managers and executives at financial organizations understand not just the top threats they’re facing, but also what they can do to fend them off.
Sep 6, 2018   |  By AlienVault
AlienVault USM simplifies threat detection and analysis. Our unified platform includes pre-integrated tools combined with up-to-the-minute threat intelligence and delivers an easy, effective way to accelerate your threat detection and response. Additionally, our Kill Chain Taxonomy allows you to focus your attention on the most important threats, with attacks classified into five categories and contextual information to help you understand attack intent and threat severity quickly.
Aug 22, 2018   |  By AlienVault
Russ Spitler, AlienVault SVP of Product, discusses how to effectively leverage crowd-sourced threat intelligence in detecting and responding to security threats.
Jul 30, 2018   |  By AlienVault
In this 2-minute video, AlienVault's Javvad Malik explains why endpoint detection and response (EDR) is an essential part of a robust security and compliance program. AlienVault USM Anywhere includes EDR capabilities as part of the Unified Security Management (USM) platform.
Jul 27, 2018   |  By AlienVault
This short video discusses the IT challenges SMB and mid-market organizations face in combating cybersecurity. Listen to the benefits of outsourcing your security monitoring to a Managed Security Service Provider (MSSP) for threat detection, response and compliance.
Jul 10, 2018   |  By AlienVault
AlienVault VP of Global Channels Mike LaPeters talks to ISMG about the industry skills shortage and how MSSPs can help companies react and respond to security threats.