Interactive Demo
The AlienVault Blogs: Taking On Today’s Threats
Latest

The most recent posts from across the AlienVault blogs.

Labs

Late-breaking discoveries and in-depth analysis.

How-To

Practical, how-to advice, tips and guidance.

Hot

Perspectives on trends and industry happenings.

Unlike security cameras, going from installation to insight with a traditional SIEM is far from straightforward. In this infographic, we’ll cover a few common problems with SIEM technologies, and how you can avoid those pitfalls with AlienVault Unified Security Management. SIEM is too complex. Collecting the right data, aggregating it, normalizing and correlating disparate technologies for that one… Read more

Posted in:
Tags: siem, usm, infosec, unified security management, security information and event management

Heartbleed is not an exploit you want to ignore as an IT professional. It exposes passwords and cryptographic keys, and requires not only that you patch OpenSSL for each of the services using the OpenSSL library, but also that you replace the private keys and certificates so that attackers won’t be able to use any of the data… Read more

Posted in:
Tags: exploit, ssl, heartbleed, openssl

This is the second of a two-part blog focused specifically on Windows XP end-of-life. Recently, I sat down with our Director of Sales Engineering, Tom D’Aquino, to talk about the Windows XP End-of-Service that has everybody riled up. The end of service date should be no surprise. Microsoft has a pretty well-defined software lifecycle policy, and they make… Read more

Posted in:
Tags:

This is the first of a two-part blog focused specifically on Windows XP end-of-life. When Microsoft announced their decision to End-of-Life Windows XP on April 8th, 2014, it caused quite the media stir, and continues to as we reach that date. I decided to sit down with our Director of Sales Engineering, Tom D’Aquino, to talk about what exactly… Read more

Posted in:
Tags: windows, point of sale, pos, xp

In Part 1 of this series, we discussed what a SIEM actually is. In Part 2, we discussed what kind of logs you need for an effective SIEM implementation. So life should be grand, right? Nope, the big problem is that most systems’ log files don’t contain entries that say, “Help! Help! I’m being attacked!”… Read more

Posted in:
Tags: siem, usm, security monitoring, unified security management