Certificate Lifecycle Management: People, Process and Technology

April 25, 2018 | David Bisson
April 25, 2018 | David Bisson

Certificate Lifecycle Management: People, Process and Technology

Trust and Digital CertificatesTrust is a valuable commodity in the age of data proliferation. An abundance of information makes it possible for bad actors to impersonate trusted brands using fake websites and accounts. Organizations therefore need a way to ensure that potential customers can trust their identity when visiting their official website, especially if they decide to purchase their…

April 24, 2018 | Kate Brew

RSA 2018 Recap and Launch of OTX Endpoint Threat Hunter!

RSA 2018 was the best RSA ever from an AlienVault perspective! It was a "giant leap" for sure.The booth was Out of This World:We had hundreds of folks pop by for a demo or theater presentation.The Big News! OTX Endpoint Threat Hunter Free Tool!!The statistics on OTX participation are amazing - as of this writing 86018…

Get the latest security news in your inbox.

Subscribe via Email

April 23, 2018 | Bob Covello

The InfoSec Marshmallow

I was listening to the Jordan Harbinger podcast the other day.  If you are a student of social dynamics, listening to this podcast is the best way to spend at least one hour of your week.  The producer of the show mentioned how a particular person was the type who “definitely ate the marshmallow”.  This…

April 20, 2018 | Javvad Malik

Things I Hearted this Week – the RSA 2018 Edition

It’s RSA week! A week where security professionals from far and wide travel to San Francisco to attend not only RSA conference, but the number of other events around it. Whatever the flavour, there’s usually something for everyone.I didn’t make the pilgrimage this year, opting for a low-key vacation with the family during…

April 19, 2018 | Javvad Malik

Let’s be Fools

The Roman poet Lucretius once wrote: “A fool believes that the tallest mountain in the world will be equal to the tallest one he has observed.”Translation? He’s essentially saying that our lived experiences define our perspectives. They warp our sense of scale like a bit of plastic in the microwave, moulding what we consider to…

April 18, 2018 | Laureen Hudson

Passive Voice and Hacker Zombies

Passive voice in written communication is a huge part of the InfoSec world’s perception problem.I get it, I mean, it’s not really your fault, right? Your 8th grade English teacher probably made you write that way, because it’s formal. Or because it’s proper. Or because you’d flunk the class…

April 17, 2018 | Danielle Russell

New! Free Threat Hunting Service from AlienVault – OTX Endpoint Threat Hunter™

70% of successful security breaches start on endpoint devices, according to IDC.1 Yet, security practitioners haven’t had an effective or low-cost way to hunt for threats against critical endpoints. Until now.Today, I am excited to announce a new free service for endpoint threat scanning—OTX Endpoint Threat Hunter™.OTX Endpoint Threat Hunter is a free threat-scanning…

April 16, 2018 | Arnie Bellini

Top-Notch Security Meets Better Business Management

Staying secure in a risky technology landscape can be a tough job for anyone. Doing it with solutions that not only do the job, but work together to make the job simpler, can be that much harder to find. The good news is that the right solutions can reduce the risk of serious security issues and make your job, and…

April 12, 2018 | Holly Barker

Navigate to Booth 729 at RSA Next Week!

It’s time for RSA Conference 2018 again and the AlienVault team has many exciting activities planned for the show!Visit us at Booth #729 and see the live unveiling of our new offering!AlienVault will be in the expo hall in booth #729; you can’t miss us! Just look for the flying saucer hanging above the large lunar module…

April 11, 2018 | Javvad Malik

Life of a Worm

This is a story of a computer worm, from the time it was coded and deployed onto the internet. It is narrated by the worm in first personZero dayI am a worm. Well that’s what Abe, the programmer who coded me says. He named me Libby, after Angelina Jolie's character, Kate Libby in the movie…

April 10, 2018 | Mike LaPeters

The Value of MSSPs and Threat Intelligence

In recent years, the range and severity of cyberattacks against organizations across a range of business sectors have increased exponentially, leading to systems breached, data stolen and operations severely impacted. According to a 2017 research report by McAfee, new malware samples hit an all-time high in Q3, increasing 10% over the previous quarter and ransomware variants were up 36%. However, in spite of…

April 9, 2018 | Matt Hosburgh

Ethereum Denver: How to Monitor a Network on the Fly

IntroSeveral weeks ago, I was presented with a unique network and security challenge. A friend of mine asked me to be part of a hackathon dubbed ETHDenver taking place in Denver, Colorado. Specifically, he asked me to help support network and security monitoring during the conference. My first question was: what exactly is ETHDenver? Even if you have only…

Watch a Demo ›