Shakespeare’s Netymology

January 18, 2018 | Laureen Hudson
January 2, 2018 | Javvad Malik

I Am Dave

This cartoon has been making the rounds on the internet for a long time. It depicts how all security technologies and efforts can be undone by “Dave” the ‘stupid user’. I can’t think of many (well no) real industries that treat their users, peers, and customers with the same level of disdain.Imagine…

December 29, 2017 | Javvad Malik

Things I Hearted this Week – 29th December 2017

And here we are, the last week of 2017! Congratulations for making it through and thank you for sticking with us. I really enjoy pulling together these weekly recaps, and I hope you enjoy them and find them informative.This week has been a quiet week as people seem to be in constant limbo as to whether they should be working…

Get the latest security news in your inbox.

Subscribe via Email

December 27, 2017 | Dane Boyd

Why Healthcare Security Awareness Training Doesn’t Work (And What to Do About It)

The last five years have seen a meteoric rise in the number of cyberattacks targeting healthcare organizations.Why? Because healthcare organizations boast some of the lowest security budgets of any industry, and personal healthcare records are worth a fortune on the dark web.Don’t believe me? Try this: Threats actors can make between $285,000 - $1.7 million from a single…

December 22, 2017 | Javvad Malik

Things I Hearted this Week 22nd December 2017

But we’ve always done (in)security this wayBeing an operator for the Twitter account for any large brand can be challenging and tough at the best of times. But it can be even more so when faced with security questions.When security experts on Twitter questioned NatWest_help why the homepage wasn’t secure the Bank…

December 20, 2017 | CryptoCypher

Building Personal Brand: From One InfoSec Student to Another

Finding employment opportunities as a student is challenging, this is no new fact. Students are consistently facing troubles with seeking internships and co-op opportunities. I myself am a student, and I have found a solution that has been seemingly effective for career development thus far: personal branding. Personal branding helps students compensate for the work experience that we just haven…

December 19, 2017 | Bob Covello

My Password Pal

“Sorry pal, my password is Spring2017. Deal with it.”Someone said those words to me the other day.  As an InfoSec professional, I’ve have grown accustomed to this type of indignant proclamation.  My jaw no longer drops to the table anymore when I hear folks speaking this way, but I still have trouble…

December 18, 2017 | Laureen Hudson

Agile Development, Agile Documentation

I remember when software documentation was linear and waterfall. No, really.Those were the days. Software was architected, designed, coded, the code was frozen… (I can totally hear you laughing from there. Shhhhh), and then it was documented. You’d buy disks, in boxes, with actual books included. Printed. On paper.…and then we had to spend…

December 15, 2017 | Javvad Malik

Things I Hearted This Week 15th December 2017

Continuing the trend from last week, I’ll continue trying to put a positive spin on the week’s security news.Why? I hear you ask. Well, I’ve been mulling over the whole optimist thing, and glass half full analogy and it does work wonders. Side note, a tweet about half full / empty glasses and infosec…

December 14, 2017 | Kim Crawley

Explain How Honeypots Work to Me

If you’ve ever had an ant problem in your home, it’s likely that you’ve used ant traps. Ants are attracted to food high in carbohydrates, especially sugary stuff. Ant traps work because they contain bait that lures ants in. So, they might go for your ant trap rather than the cookie crumbs you dropped…

December 13, 2017 | Chuck Brooks

Emerging Technologies and the Cyber Threat Landscape

Cybersecurity is at a tipping point, the sheer volume of breaches, attacks, and threats has become overwhelming.  Juniper Research, suggests that the rapid digitization of consumers’ lives and enterprise records will increase the cost of data breaches to $2.1 trillion globally by 2019. About 1.9 billion data records got exposed in the 918 data breaches that occurred in the first…

December 12, 2017 | Laureen Hudson

It’s Only A Hacker If It’s Linus Himself

Anyone who’s worked in any field related to internet security for any length of time has used the term hacker, or had the term used on them. We don’t use this term in AlienVault documentation, and thanks to some questions from fellow wordgeeks outside the company, I wanted to talk about why that is.One of…

December 11, 2017 | Javvad Malik

The Impact of NotPetya and WannaCry

Another wake up callEvery time there is a major security incident many people claim it to be the “wake up call” the incident has needed. Surely, it stands to reason that if a big enough incident occurs, people will stand up, take notice, and take the necessary steps needed to make sure it doesn’t happen…

Watch a Demo ›