DNS Poisoning and How To Prevent It

March 19, 2018 | Jeff Thompson
March 9, 2018 | Javvad Malik

Things I hearted this week 9th March 2018

It’s been an uneventful week for the most part. I did spend a lot of time reading tweets by Today In Infosec. If you don’t know of it, I suggest checking it out. As the name suggests, it tweets out news from the world of information security from previous years. I was thinking that maybe I…

March 8, 2018 | Kim Crawley

Explain What DDoS Is

Your favorite website goes offline. That firewall in your office network isn’t filtering anything and is overwhelming the server machines that it is connected to. If an LDAP port is hit by a DDoS attack, you have no Active Directory securing the user accounts on your Windows client PCs. Maybe an IMAP server was hit,…

Get the latest security news in your inbox.

Subscribe via Email

March 7, 2018 | Javvad Malik

An Interview with Graham Cluley

I can’t remember what year I first met Graham Cluley. It may have been around 2006 at an awards event of some sort. We were both nominated in the same category; I believe it was for best security blogger. Graham was already well-established with many awards under his belt, whereas I was the jittery newbie, glad to have even…

March 6, 2018 | John McLeod

AlienVault USM Anywhere ISMS is Now Certified to ISO 27001:2013

I’m pleased to announce that AlienVault’s USM Anywhere Information Security Management System (ISMS) is certified to ISO 27001:2013 by an accredited certification body. This certification underscores our commitment to providing effective threat detection and rapid incident response capabilities in a secure cloud environment.Our certification process was led by Coalfire ISO, Inc., an ISO/IEC 27001 Certification Body…

March 2, 2018 | Javvad Malik

Things I Hearted this Week 2nd March 2018

This week London has been in the midst of snowmageddon! An inch of snow ground the city to a halt with schools closed and the capital on red alert. Fortunately, one of the perks of working from home is that I get to stay on top of the security news regardless of the weather, so put on your snow boots…

March 1, 2018 | Bob Covello

What We Lack Most in InfoSec: Inherited Credibility

Ask any InfoSec person the following question:What do you lack most in your job?Can you predict the answers?  Of course you can.  Most InfoSec folks will answer that they lack money, and resources (also known as “people”).  Some of the more creative types will also mention that they lack time.These are all…

February 27, 2018 | Mike LaPeters

Announcing the Winners of our Partner of the Year Awards

The results are in, and we’re thrilled to recognize seven outstanding AlienVault partners. These companies achieved phenomenal business growth during 2017 and are the winners of our Partner of the Year awards!The AlienVault Partner Program enables leading VARs, system integrators, managed security service providers (MSSPs), managed detection & response providers (MDRs) and corporate resellers to sell and support…

February 26, 2018 | Kate Brew

SIEM Content Engineer - Why Is It a “Thing”?

If you Google “SIEM Content Engineer,” “SIEM Threat Content Engineer,” or “SIEM Content Developer,” you will see a bunch of ads, job listings and very little other content. I believe this is because the concept is new, and it appears SIEM Content Engineer is emerging as a new job title that HR departments in…

February 23, 2018 | Javvad Malik

Things I Hearted this Week 23rd Feb 2018

This week seems to have flown past very quickly. We’re almost at the end of February but the security goodness (and badness depending on which side of the fence you sit) keeps rolling in at breakneck speed.I’m actually contemplating moving somewhere warm for the rest of winter. Not that it gets unbearably cold in London,…

February 22, 2018 | Leslie Johnson

Threat Detection & Response Made Easier for Growing Financial Services Company

For a San-Francisco based financial services firm that partners with technology entrepreneurs in the US and China, maintaining a strong security posture is critical to the company’s success. The firm’s portfolio of 200 companies are security conscious and expect the firm to stay ahead of security threats. But this can be difficult, especially for a small team…

February 21, 2018 | David Bisson

Crypto-Miners: What Are They and What Steps You Can Take to Protect Yourself

Bitcoin's value grew significantly in 2017. At the beginning of the year, a single Bitcoin was worth less than $1000. By year's end, its price had grown to over $13,000. That's after peaking at $19,086.84 on 19 December.Such growth didn't go unnoticed by digital attackers or by organizations looking to supplement their online advertising revenue. Both responded by deploying crypto-miners.…

February 20, 2018 | Kim Crawley

How SIEM Correlation Rules Work

SIEM is a powerful security tool when deployed properly. Network security appliances like IDS devices, IPS devices, and firewalls generate an awful lot of logs. A well-configured SIEM will alert security administrators to which events and trends they should pay attention to. Otherwise they’ll be too lost in event log noise to be able to effectively handle possible…

Watch a Demo ›