January 15, 2019 | Devin Morrissey

What Impact Will Cryptocurrency Have in 2019?

According to Investopedia, “cryptocurrency is a digital or virtual currency that uses cryptography for security.” In other words, it’s electric money that is designed to be used by online users both safely and securely. The price of digital currencies, like Bitcoin and Ripple, have been all over the place throughout the past year — mainly because…

January 14, 2019 | Rob Graham

Software Bill of Materials (SBoM) - Does It Work for DevSecOps?

There has been much discussion of a “software bill of materials” (SBoM) lately, for use when addressing security vulnerabilities. Many are curious, wanting to learn more. Googling the term gives lots of positive descriptions. This post will go negative, describing problems with the concept.Rather than cover the entire concept, I want focus on a narrow part of…

Get the latest security news in your inbox.

Subscribe via Email

January 11, 2019 | Javvad Malik

Things I Hearted This Week, 11th Jan 2019

And we’re back into the swing of things with a proper first week on the books and plenty to talk about as to the weird and wonderful goings on in the world of security, technology and beyond.International Security of MysteryJoe Gray hasn’t really flown outside of the US other than Canada, so when presented…

January 10, 2019 | Kate Brew

Top 12 Blogs of 2018

Time to look back on the top AlienVault blogs of 2018! Here we go:A North Korean Monero Cryptocurrency Miner by Chris DomanCrypto-currencies could provide a financial lifeline to a country hit hard by sanctions. Therefore it’s not surprising that universities in North Korea have shown a clear interest in cryptocurrencies. Recently the Pyongyang University of Science and…

January 9, 2019 | Amy Pace

AlienVault in Gartner MQ for SIEM

Gartner just released their 2018 Magic Quadrant for Security Information and Event Management (SIEM), which we’re once again excited to be part of!Our inclusion in the Gartner SIEM MQ is further validation that our unique, unified approach to threat detection and response continues to resonate.  Many continue to struggle with increasingly advanced threats, expanding attack surfaces, and…

January 8, 2019 | Tony DeGonia

2018 Sees Record Number of Online Retail Data Breaches

During the holiday season people logged on to make purchases through online retailers, like no other time of the year. While there was significant growth in many segments of society on a global scale in 2018, we also  saw a significant increase in online retail breaches where personally identifiable information was compromised at an alarming rate. With more and more…

January 7, 2019 | Tom D'Aquino

Data Exfiltration in AWS: Part 2 of Series

In the previous blog in this four-part blog series, we discussed AWS IAM and how it can be compromised to allow for data exfiltration. In this blog we will drill into data exfiltration.One of the more common issues reported on lately involves EC2 instances running data storage services like Elasticsearch and MongoDB, which by default don't have any…

January 4, 2019 | Javvad Malik

Things I Hearted This Week, 4th Jan 2019

Welcome to 2019! I hope that you had a well-deserved break over the holidays, and a special shout out to all the people that carried on pulling shifts in the SOC, were on-call, and helped ensure stuff stayed as secure as possible while the rest of us were eating and sleeping too much! I’ve said it before, and I…

January 3, 2019 | Tony DeGonia

The “Internal” Cyber Kill Chain Model

An Alternative to the “Classic” Cyber Kill Chain Model for Internal Attacks and BreachesDeveloped by Lockheed Martin, the Cyber Kill Chain® (CKC) framework is part of the Intelligence Driven Defense® model for the identification and prevention of cyber intrusions activity. The model identifies what adversaries must complete in order to achieve…

December 27, 2018 | Rohan Viegas

How Malware Sandboxes and SIEMs Work in Tandem to Effectively Detect Malware

Rohan Viegas of VMRay explains some of the key factors IT security teams should consider when evaluating a malware analysis sandbox and whether it’s a good fit for their existing SIEM environment. He then outlines how VMRay Analyzer complements and enhances the capabilities of AlienVault’s flagship platform, USM Anywhere.For IT security organizations, malware threats and…

December 24, 2018 | Josh Lake

The Dangers of Free VPNs

If you use a free VPN, then you have to wonder how your provider earns money to cover their own costs. The answer often involves advertising, but it can also be through far more sinister means.Running a VPN service costs a significant amount of money. There are setup costs, infrastructure costs, labor and other running costs. The companies behind…

December 20, 2018 | Tawnya Lancaster

Let’s Chat: Healthcare Threats and Who’s Attacking

Healthcare is under fire and there’s no sign of the burn slowing.Look, it’s no secret that hackers have been targeting hospitals and other healthcare providers for several years — and probably no surprise that healthcare is one of the top target industries for cybercrime in 2018. In the US alone, in fact, more than 270 data breaches…

Watch a Demo ›
GET PRICE FREE TRIAL