December 13, 2018 | Javvad Malik

The REAL 2019 Cyber Security Predictions

It’s December, which means it’s time to get those 2019 cyber predictions going. While there are many well-informed, and some not-so-well informed opinions out there, I’ve dug through the cyber underground, I’ve climbed data mountains, and delved to the depths of the dark web to seek out what is really happening.Having spilt…

December 11, 2018 | Tawnya Lancaster

A HIPAA Compliance Checklist

Five steps to ensuring the protection of patient data and ongoing risk management.Maintaining security and compliance with HIPAA, the Health Insurance Portability and Accountability Act, is growing ever more challenging. The networks that house protected health information (PHI or ePHI) are becoming larger and more complex — especially as organizations move data to the cloud. At the same time,…

Get the latest security news in your inbox.

Subscribe via Email

December 10, 2018 | Kate Brew

Who Would You Hire in Your SOC?

I got curious about what kind of people are most desired in a Security Operations Center (SOC). I wondered how accepting InfoSec blue teamers would be to having a team member with a great attitude and system administration or network management skills, versus someone with deep InfoSec knowledge and skills. So I did a poll on Twitter to learn more.…

December 7, 2018 | Javvad Malik

Things I Hearted This Week, 7th December 2018

It’s December, so you’re either on holiday, wishing you were on holiday, or hoping the next security article you read isn’t related to predictions.Well, I can’t help you with the holidays, but I can promise there will be no predictions here. It’s just good old-fashioned news of the juiciest…

December 6, 2018 | Josh Lake

Password Stealers Aren’t Letting up Any Time Soon

Password security has always been a challenge. Brute force attacks are constantly getting more powerful, but they aren’t the only threat you have to worry about. A range of password stealing malware continues to grow in popularity.One example, Agent Tesla, has seen its detection rate grow 100% in just three months, according to data from LastLine. Despite this…

December 5, 2018 | Javvad Malik

Protecting the Wrong Things

Businesses rely on technology more today than they ever have in the past. In fact, many business models are built entirely around a technology which, if disrupted, could spell ruin.A traditional business with a brick and mortar presence is probably better-placed to withstand an extensive online disruption or outage. For example, if a bank’s online system or…

December 4, 2018 | Anne Chow

Is Cybersecurity Insurance on Your Holiday Shopping List?

Three simple steps to protecting your small businessContinued news reports of large-scale data breaches and the steady increase of cyber fraud like spam calls, identity fraud and unauthorized account access should be enough to scare anyone. So-called nation-state hackers attempting to infiltrate government entities and universities, massive data breaches, and new Ransomware threats are constantly in the headlines. So…

December 3, 2018 | Leslie Johnson

Award-winning Quarter Caps a Phenomenal Year

We’ve had a lot to celebrate this year. AlienVault, now an AT&T company, has received many awards, including three this quarter. In October, USM Anywhere was named the 2018 Cloud Security Solution of the Year after receiving the most votes in the industry. This recognition validates our SaaS-driven deployment model that integrates critical security capabilities into a…

November 30, 2018 | Javvad Malik

Things I Hearted this Week - 30th Nov 2018

Last week I was off attending IRISSCON in Dublin and so there was no update, and this week I’ve been at the SAN EU security awareness summit - so while I have been hearting things for the last two weeks, I’ve not had a chance to put them down.I don’t want to miss…

November 28, 2018 | Tom D'Aquino

IAM and Common Abuses in AWS

This is the first of a 4 part blog series on security issues and monitoring in AWS.Identity and Access Management (IAM) in AWS is basically a roles and permissions management platform. You can create users and associate policies with those users. And once those users are established you get set of keys (access key and a secret key), which allow…

November 27, 2018 | Chuck Brooks

Security Orchestration, Automation and Response (SOAR) - The Pinnacle For Cognitive Cybersecurity

The cognitive tools/technologies of machine learning (ML) and artificial intelligence (AI) are impacting the cybersecurity ecosystem in a variety of ways. Applied AI machine learning and natural language processing are being used in cybersecurity by both the private and public sectors to bolster situational awareness and enhance protection from cyber threats. The algorithmic enablers that make ML and AI…

November 26, 2018 | Julia Kisielius

AlienVault Delivers Phenomenal Cloud Security for AWS Customers

Viva Las Vegas! We aliens have landed at AWS re:Invent 2018 (Booth #1506), bringing phenomenal threat detection, response, and compliance to the AWS cloud. As I gear up for a full day of live product demos, I thought I’d take a moment to highlight some of the ways in which AlienVault is delivering phenomenal security to our customers’…

Watch a Demo ›
GET PRICE FREE TRIAL