How SIEM Correlation Rules Work

February 20, 2018 | Kim Crawley
January 31, 2018 | Leslie Johnson

Threat Detection in a Changing Market: A Conversation with AlienVault MSSP Partner Sword & Shield

Recently, I had a chance to speak with Jason Graf, director of managed security services for Sword & Shield Enterprise Security, a top Managed Security Services Provider (MSSP) based in Knoxville, Tennessee. We talked about the evolving threat landscape and the challenges associated with detecting and analyzing ransomware and other emerging threats on a daily basis.Graf started the discussion…

January 30, 2018 | Chris Doman

OTX Trends Part 3 - Threat Actors

By Javvad Malik and Chris DomanThis is the third of a three part series on trends identified by AlienVault in 2017.Part 1 focused on exploits and part 2 addressed malware. This part will discuss threat actors and patterns we have detected with OTX.Which threat actors should I be most concerned about?Which threat actors your organization should be most…

Get the latest security news in your inbox.

Subscribe via Email

January 29, 2018 | Jason Kichen

Hackers Using AI? An Increase in the FUD Factor

It’s hard to envision hackers, whether skiddies, APTs, or anything in between, using any sort of artificial intelligence (AI) or machine learning (ML) to attack a target network. Despite the availability of these sophisticated technologies, the most simplistic attack tactics continue to work. Enterprises aren’t patching known vulnerabilities; freely available malware can run in memory un-detected;…

January 26, 2018 | Bob Covello

NY State Department of Financial Services New Cybersecurity Regulation – CISO Attestation Due Feb 15

The first New York State (NYS) Department of Financial Services (DFS) CISO Attestation is due on February 15th.Last year, the NYS DFS enacted a new cybersecurity regulation that affects all financial companies that conduct business in the State of New York.The regulation is targeted towards financial companies that conduct business in New York State.  A "Covered Entity"…

January 25, 2018 | Laureen Hudson

When Bad Language Happens To Good Systems

In my last blog, I wrote about how words are created and then become mainstream over time, and how that time is longer for normal words, and shorter for words used to describe things in tech. But it’s not always a straightforward nor does it always land in the correct place. To illustrate, I give you, “on…

January 24, 2018 | Javvad Malik

Mental Models & Security: Thinking Like a Hacker

In the world of information security, people are often told to “think like a hacker,” which inevitably reminds me of Sylvester Stallone muttering his line in Demolition Man -- “Send a maniac to catch a maniac”.While such words of wisdom work great for movies, they tend not to be very helpful for those trying to…

January 23, 2018 | Chris Doman

OTX Trends Part 2: Malware

By Javvad Malik and Christopher DomanThis is the second of a three part series on trends identified by AlienVault.Part 1 focused on the exploits tracked by OTX. This blog will talk about the malware, and Part 3 will discuss trends we’re seeing in threat actors.Which malware should I be most concerned about?Most security incidents that a…

January 22, 2018 | Kim Crawley

SharePoint Security Best Practices

Being conscientious of SharePoint security is simple if you understand the basics. SharePoint is a Microsoft platform which is designed to integrate with Microsoft Office. Microsoft launched the product in 2001. SharePoint is useful for thousands of organizations worldwide because it facilitates sharing documents on private web servers.SharePoint can be purchased as a separate product to deploy on your own…

January 19, 2018 | Javvad Malik

Things I Hearted this Week – 19th Jan 2018

Happy Friday wonderful people. It’s been a busy week in infosec with a flurry of activity, so let’s jump right in.The 100 Billion Dollar Infosec QuestionIf someone gave you 100 billion dollars to improve information security, how would you spend it?No, seriously, please. Give it some thought.This question spurred Dan Klinedist to pen his…

January 18, 2018 | Laureen Hudson

Shakespeare’s Netymology

One of the coolest things about editing in the tech space, for a word nerd like me, is that the language is brand-new, ad-hoc, and usually made up on the fly by an engineer or security researcher frantically trying to communicate a new idea without saying something like, “and then the thing happens…”The technical term for…

January 16, 2018 | Chris Doman

OTX Trends Part 1- Exploits

By Javvad Malik and Christopher DomanIntroductionEvery year, AlienVault records billions of anonymised security events from our customers. This telemetry can be aggregated to establish macro trends. And for many years, we have also been comprehensively recording other vendors' threat reports in our Open Threat Exchange (OTX) platform.We have combined these two data-sets to help…

January 12, 2018 | Javvad Malik

Things I hearted this week: 12th Jan 2018

Carphone Warehouse Fined £400,000The Information Commissioner’s Office (ICO) has fined Carphone Warehouse an eye-watering £400,00 for what it referred to as distinct and significant inadequacies in the phone company’s security controls.The full report by the ICO (PDF) is worth reading. It goes into a lot of detail around the vulnerabilities such as the…

Watch a Demo ›