August 11, 2014 | Fabrizio Siciliano

BadUSB: How To Do USB Device Detection with OSSEC HIDS and AlienVault USM

In a talk last week at Black Hat, a new form of malware that operates inside USB devices and can cause full system compromise with a self-replicating USB virus was discussed. With this type of evil associated with USBs, I thought to share a small how-to on detecting and alerting in AlienVault’s USM platform whenever a USB device …

August 6, 2014 | Kate Brew

Black Hat 2014 - AlienVault Booth Action

Day 1 starts out with Shanel Vandergriff getting a fairly #AwkwardHug from Jayson Street early in the morning in the booth. Jayson hacked his way into Black Hat before opening time to administer the hug. His tactic: approach the conference guard and engage in conversation, reducing the suspicion that he was hacking in. Score one Jayson. We had many visitors who…

Get the latest security news in your inbox.

Subscribe via Email

July 29, 2014 | Russ Spitler

BYOD – shedding the last illusion of control

Many years ago, organizations relied solely on perimeter-based devices to provide their basic security control. Poorly designed business services (mainframe/internal websites/email/etc.) were 'protected' by perimeter-based systems that restricted access. We used firewalls of one form or another to make sure only ‘authorized’ users accessed the systems. This was in a large part possible by the…

July 25, 2014 | Jaime Blasco

Attackers abusing Internet Explorer to enumerate software and detect security products

During the last few years we have seen an increase on the number of malicious actors using tricks and browser vulnerabilities to enumerate the software that is running on the victim’s system using Internet Explorer. In this blog post we will describe some of the techniques that attackers are using to perform reconnaisance that gives them information for…

July 23, 2014 | Kate Brew

Karl Hart, Security Analyst and AlienVault User

To get more of a practitioner’s view of AlienVault, I recently reached out to Karl Hart, IT Security Analyst and AlienVault user. Karl works at a privately-held financial institution in Ohio, and he is involved in every aspect of IT security. This includes incident response, vulnerability assessment, policies, procedures, and penetration testing. Since his company is privately held,…

July 8, 2014 | Branden Williams

PCI DSS Logging Requirements

When it comes to PCI DSS Logging Requirements, sometimes the most challenging requirements to meet are the ones that can be the easiest technically to achieve. In dealing with logging, every single system around has the capability to meet PCI DSS, but managing those logs and ensuring they are continually being generated can be challenging. The common problem that companies…

July 2, 2014 | Patrick Bedwell

Internet of Things – It’s Not About Your Fridge

(This is the first in an occasional series of blogs on IoT. Over the next few months I’ll cover various topics, such as how your network will look different in an IoT world, how to get started preparing for IoT, where in your network the devices most likely show up first (if they’re not already there),…

June 30, 2014 | Barmak Meftah

The CFO’s IT security checklist: How to invest wisely in protecting your organization

When I think about all of the people involved in managing risk and making security decisions in an organization these days, the guy who may now have the toughest role is the CFO. For the rest of us, investing in security technology looks like it should be a relatively easy decision: “Yes, we must have it.” But the…

June 27, 2014 | Patrick Bedwell

AlienVault Placed in Visionaries Quadrant of Gartner’s Magic Quadrant for SIEM

Image courtesy of Visionary Studios Gartner just published their 2014 Magic Quadrant for Security Information and Event Management (SIEM) and we are very pleased to be the only vendor in the Visionaries quadrant. Gartner acknowledges how our dedication to simplified security, coupled with affordable pricing, makes AlienVault USM the perfect fit for organizations with limited budgets and few in-house resources. This…

June 24, 2014 | Jimmy Vo

SANS Top 20 Critical Security Controls and Security Monitoring (SIEM)

While resources such as the SANS 20 Critical Controls are helpful, businesses of all sizes face similar struggles with building and maintaining their security programs and determining their critical security controls. This can be disastrous because motivated attackers may target organizations found to lack basic security controls. The deficiency in security controls is often attributed to: Lack of internal talent Lack…

June 19, 2014 | Xavier Mertens

Tracking Patient Zero

In medical science, the patient zero is defined as "the initial patient in the population of an epidemiological investigation” (Source: Wikipedia). Information security has many links with medical science, after all, the term “virus” is used in both worlds. Wikipedia defines virus as "a small infectious agent that replicates only inside the living cells of other organisms.…

June 3, 2014 | Kate Brew

MSSPs Choosing AlienVault as a Platform

The Managed Security Services business seems to be thriving, and more and more MSSPs are building their businesses on AlienVault Unified Security Management (USM.) The rapid adoption is evidenced by the new additions to the AlienVault MSSP network announced today: Cegeka, Columbus Business Solutions, GoGrid, Onsight, Hawaiian Telcom, Sedara Security, Terra Verde and T-Systems Austria. It appears that one of…

Watch a Demo ›
Get Price Free Trial