The InfoSec Marshmallow

April 23, 2018 | Bob Covello
April 4, 2018 | Stephen Roe

4 SIEM Use Cases That Will Dramatically Improve Your Enterprise Security

No business will argue against an enterprise-level security solution. With threats coming from every direction, a centralized security platform gives administrators the fighting chance they deserve to stave off malicious attacks.Security information and event management or SIEM systems are considered to be the industry gold standard. While effective, knowing how to use SIEM solutions to reveal valuable insight can…

April 3, 2018 | Javvad Malik

Security Myths : TweetChat Roundup

Continuing our tradition of tweetchats, we were fortunate to have the brilliant Lesley Carhart join us as a special guest to share her views on security myths. It was a lively discussion with many viewpoints shared. Searching for the #AlienChat hashtag should give you a good insight into all the conversation.Incident responseWe kicked things asking what people thought…

Get the latest security news in your inbox.

Subscribe via Email

April 2, 2018 | David Bisson

4 IRS Scams to Watch Out for This Tax Season

It's that time of year again! Individuals and businesses alike are busy preparing to file their taxes. They have until 17 April, 2018 to file with the U.S. Internal Revenue Service (IRS).The IRS is well-aware of this looming deadline. Just as it knows fraudsters will try to prey upon taxpayers, employers and tax professionals leading up to that date. …

March 30, 2018 | Javvad Malik

Things I Hearted this Week – 30th March 2018

Another week and social media giants Facebook and Google are under scrutiny by all and sundry as to the information they gather and the privacy implications. I know that something is big when my Dad asked me about the whole debacle over dinner this week – and he doesn’t even use, or fully understand Facebook.Many years ago,…

March 29, 2018 | Monty St John

YARA Rules for Finding and Analyzing in InfoSec

IntroductionIf you work in security anywhere, you do a lot searching, analyzing, and alerting.  It’s the underpinning for almost any keyword you can use to describe the actions we take when working.  The minute any equation I’m working on comes down to “finding” or “analyzing”, I know what to…

March 28, 2018 | Tricia Howard

Dude, Where’s My [Unstructured] Data?

Okay, so as a 90’s born kid who grew up in the 2000s, the whimsical spectacular “Dude, Where’s My Car” was a huge intro to my love for comedy. If you haven’t seen the flick – TL;DW is this: Jesse (Ashton Kutcher) and buddy Chester (Seann William Scott) have a wild night…

March 27, 2018 | Matt Kimpel

Tales from the SOC: The Simulated Attack

IntroductionIn today’s world, understanding threats and how to avoid them are critical to a business’s success. Last year, we saw an evolution in malware and attacks. Ransomwares like WannaCry made their debut; featuring worm-like attributes that allowed ransomware to self-propagate through a network, exploiting vulnerable machines and continuing the damage. We started to see attackers…

March 26, 2018 | CryptoCypher

Explain PGP Encryption: An Operational Introduction

If you don’t already know what Pretty Good Privacy (PGP) is; you may have heard of PGP before, perhaps during a discussion on how to secure your communications, or perhaps in one of those how-to maintain privacy guides. PGP is a popular solution for encrypting, decrypting, signing, and verifying messages and files, often found in email communications and…

March 23, 2018 | Javvad Malik

Things I Hearted this Week 23rd March 2018

This week has been dominated by the Cambridge Analytica – Facebook debacle. So, let’s just skip all of that and jump right into the security news that you may have missed.Stealing IPWe often hear of intellectual property being stolen by competitors. However, it’s not too common to hear of IP being stolen from an…

March 22, 2018 | Danielle Russell

Forrester Study: Breaking Down the Total Economic Impact of AlienVault USM

There’s just something about InfoSec that attracts the skeptics, the leery, the Agent Scullys among us. Perhaps this natural tendency to distrust is what makes security analysts so keen at threat hunting, so perceptive to see a glimmer of anomalous activity in a stream of “normal.”It’s perhaps this same tendency to distrust that…

March 21, 2018 | Matt Howard

What Have You Done for Me Lately? Tips for MSSPs

As security professionals, we like to imagine ourselves diving through the air to stop that ransomware-infected thumb drive going into the unsuspecting user’s USB port.  Or stopping the Stuxnet virus before the nukes launch, sending us into WWIII. The truth is, a lot of the time, things are rather quiet for us.  We’ve…

March 20, 2018 | Laureen Hudson

Cambridge Analytica Debacle -The Definition Of Breach

Pretty much the motto of my profession is “word choice matters.” I say it a lot. It appears somewhere in the marginalia of pretty much everything I’ve ever edited. Words have denotation, and connotation. There are considerations for dialect, and for popular use.It can be fiddly and annoying to be queried so; I get it.…

Watch a Demo ›