Interactive Demo
The AlienVault Blogs: Taking On Today’s Threats

The most recent posts from across the AlienVault blogs.


Late-breaking discoveries and in-depth analysis.


Practical, how-to advice, tips and guidance.


Perspectives on trends and industry happenings.

Posted in Blog: Labs Blog

During the last few years we have seen an increase on the number of malicious actors using tricks and browser vulnerabilities to enumerate the software that is running on the victim’s system using Internet Explorer. In this blog post we will describe some of the techniques that attackers are using to perform reconnaisance that gives them information for… Read more

Posted in:
Tags: sykipot, internet explorer, waterhole, vulnerabilities, detecting endpoint software, angler exploit kit

To get more of a practitioner’s view of AlienVault, I recently reached out to Karl Hart, IT Security Analyst and AlienVault user.  Karl works at a privately-held financial institution in Ohio, and he is involved in every aspect of IT security.  This includes incident response, vulnerability assessment, policies, procedures and penetration testing.  Since his company… Read more

Posted in:
Tags: ossim, otx, siem, usm, user profiles

Amazon is nowadays a major provider of cloud computing services. Our product, AlienVault USM, allows deploying an Amazon image and, then, connecting to it through a console or through a web interface. The following points are essential for deploying an Amazon image: Instance type (to meet the recommended system requirements) Disk performance optimization: EBS-optimized Provisioned IPOS (set value to 4000) Add… Read more

Posted in:
Tags: cloud deployment, amazon

One of the core benefits of the AlienVault Unified Security Management (USM) platform is the ability to take advantage of the crowd-sourced threat intelligence within the Open Threat Exchange, also known as OTX. OTX is the largest repository of crowd-source threat intelligence on this planet…or any other (and take it from us, we know a little about intelligence… Read more

Posted in:
Tags: otx, crowd-sourced threat intelligence, threatfinder

When it comes to PCI DSS Logging Requirements, sometimes the most challenging requirements to meet are the ones that can be the easiest technically to achieve. In dealing with logging, every single system around has the capability to meet PCI DSS, but managing those logs and ensuring they are continually being generated can be challenging. The common problem that companies… Read more

Posted in:
Tags: pci, branden williams, pci dss, logging

Get Security Visibility & Actionable Intelligence.
RSS Feed

RSS Feeds:

Labs Research
Security Essentials
Industry Insights
All Blogs
Get Email Updates

Featured Content