January 25, 2019 | Javvad Malik

Things I Hearted this Week, 25th January 2019

And in what feels like a blink of an eye, January 2019 is almost over. Time sure does fly when you’re having fun. But we’re not here to have fun, this is a serious weekly roundup of all the security news and views, with a few cynical observations thrown in for good measure.Tables Turn on Journalists …

January 24, 2019 | Javvad Malik

How to Be an InfoSec Thought Leader

What does it mean to be a thought leader? Is it merely the opposite of a thought follower, or is it more nuanced than that?Becoming a thought leader is the epitome of professional success. But a thought leader isn’t a title that one attains by going to Harvard, or Cambridge. No, it’s a title bestowed…

Get the latest security news in your inbox.

Subscribe via Email

January 24, 2019 | Karoline Gore

The Changing Face Of Cybersecurity In The 21st Century

67% of small and micro businesses have experienced a cyber attack, while 58% have experienced a data breach within the last 12 months, according to a study conducted by the Ponemon Institute. Cybersecurity has become one of the major questions that plague the 21st century, with numerous businesses reporting significant losses resulting from loss of private customer data, denial of service (DoS)…

January 23, 2019 | Tony DeGonia

10 Steps to Creating a Secure IT Environment

Every day, as a part of my work at AlienVault, I talk to prospective clients. Many of them are trying to put together a security plan for their business. Most of the people I talk to are IT professionals who, like everyone else, are learning as they go.During my time in IT and the security industry, I have seen…

January 22, 2019 | Elisha Girken

Incident Response Steps Comparison Guide

What is Incident Response? It’s a plan for responding to a cybersecurity incident methodically. If an incident is nefarious, steps are taken to quickly contain, minimize, and learn from the damage.Not every cybersecurity event is serious enough to warrant investigation. Events, like a single login failure from an employee on premises, are good to be aware…

January 18, 2019 | Javvad Malik

Things I Hearted This Week, 18 Jan 2019

London saw a few flakes of snow drop this week, and social media nearly broke with everyone sharing photos of the white pixie dust falling from the sky. Fortunately, I have few friends, and even fewer social media platforms that I use, so was saved from most of the insanity… well, except for my daughter singing “let it…

January 17, 2019 | Tony DeGonia

The Dark Web has a Serious Deduplication Problem

In a post released on 1/8/19, I wrote about the record number of breaches in 2018. This brought to mind a podcast that I was listening to a few days back hosted by Corey Nachreiner, CTO of WatchGuard Technologies, Inc. on his 443 Podcast. Corey discussed the potential data deduplication problem on the Dark Web. This article will attempt to break down how…

January 15, 2019 | Devin Morrissey

What Impact Will Cryptocurrency Have in 2019?

According to Investopedia, “cryptocurrency is a digital or virtual currency that uses cryptography for security.” In other words, it’s electric money that is designed to be used by online users both safely and securely. The price of digital currencies, like Bitcoin and Ripple, have been all over the place throughout the past year — mainly because…

January 14, 2019 | Rob Graham

Software Bill of Materials (SBoM) - Does It Work for DevSecOps?

There has been much discussion of a “software bill of materials” (SBoM) lately, for use when addressing security vulnerabilities. Many are curious, wanting to learn more. Googling the term gives lots of positive descriptions. This post will go negative, describing problems with the concept.Rather than cover the entire concept, I want focus on a narrow part of…

January 11, 2019 | Javvad Malik

Things I Hearted This Week, 11th Jan 2019

And we’re back into the swing of things with a proper first week on the books and plenty to talk about as to the weird and wonderful goings on in the world of security, technology and beyond.International Security of MysteryJoe Gray hasn’t really flown outside of the US other than Canada, so when presented…

January 10, 2019 | Kate Brew

Top 12 Blogs of 2018

Time to look back on the top AlienVault blogs of 2018! Here we go:A North Korean Monero Cryptocurrency Miner by Chris DomanCrypto-currencies could provide a financial lifeline to a country hit hard by sanctions. Therefore it’s not surprising that universities in North Korea have shown a clear interest in cryptocurrencies. Recently the Pyongyang University of Science and…

January 9, 2019 | Amy Pace

AlienVault in Gartner MQ for SIEM

Gartner just released their 2018 Magic Quadrant for Security Information and Event Management (SIEM), which we’re once again excited to be part of!Our inclusion in the Gartner SIEM MQ is further validation that our unique, unified approach to threat detection and response continues to resonate.  Many continue to struggle with increasingly advanced threats, expanding attack surfaces, and…

Watch a Demo ›