Danielle Russell | AlienVault Blogs
Danielle Russell

Danielle Russell

Senior Product Marketing Manager

Danielle is a Senior Product Marketing Manager at AlienVault, responsible for product messaging and positioning, go-to-market strategy, and sales enablement. Prior to AlienVault, Danielle held a marketing leadership position with an IT software company in the telecommunications industry. Danielle earned a B.S. Life Sciences Communication from the University of Wisconsin.

May 1, 2018 | Danielle Russell

AlienVault Monthly Product Roundup April 2018

We are continuously making improvements and rolling out new features to USM Anywhere to help your team to be more effective at detecting and responding to threats. You can keep up with USM Anywhere releases by reading our release notes in the AlienVault Product Forum. Here is a roundup of the highlights from our April 2018 releases:Go Threat Hunting with…

April 17, 2018 | Danielle Russell

New! Free Threat Hunting Service from AlienVault – OTX Endpoint Threat Hunter™

70% of successful security breaches start on endpoint devices, according to IDC.1 Yet, security practitioners haven’t had an effective or low-cost way to hunt for threats against critical endpoints. Until now.Today, I am excited to announce a new free service for endpoint threat scanning—OTX Endpoint Threat Hunter™.OTX Endpoint Threat Hunter is a free threat-scanning…

Get the latest security news in your inbox.

Subscribe via Email

March 22, 2018 | Danielle Russell

Forrester Study: Breaking Down the Total Economic Impact of AlienVault USM

There’s just something about InfoSec that attracts the skeptics, the leery, the Agent Scullys among us. Perhaps this natural tendency to distrust is what makes security analysts so keen at threat hunting, so perceptive to see a glimmer of anomalous activity in a stream of “normal.”It’s perhaps this same tendency to distrust that…

November 7, 2017 | Danielle Russell

New AlienVault USM Anywhere™ Editions Expand Pricing and Deployment Flexibility for All

AlienVault was founded on the belief that every organization deserves a strong security posture, regardless of the size of their IT environment or the size of their IT security budget. We pioneered Unified Security Management® (USM) so that resource-limited IT security teams could meet their security and compliance goals without the cost and complexity of managing multiple point…

August 16, 2017 | Danielle Russell

GlobeImposter Ransomware on the Rise

Ah, the summer anthem. That quintessential song that defines summertime as much as hot nights, barbeques, and beach vacations. Whether it’s the Beach Boys’ “I Get Around” (1964), Springsteen’s “Dancing in the Dark” (1984), or Pearl Jam’s “Last Kiss” (1999), the summer anthem is transcendent, yet perfectly emblematic of its…

June 21, 2017 | Danielle Russell

A RAT that Tweets: New ROKRAT Malware Hides behind Twitter, Amazon, and Hulu Traffic

To carry out attacks, malware and botnets rely on communication with a Command & Control server (C&C or C2) to receive instructions. As a result, today’s security tools have become extremely adept at detecting traffic to and from malicious IP addresses. When a system or device starts talking to a malicious IP or domain, alarms sound…

May 15, 2017 | Danielle Russell

The Power of Community: My Real-Life Lesson in Community-Sourced Threat Intelligence

Last week, my husband received the dreaded call from our bank.“Hello Mr. Smith. We’ve noticed some unusual activities on your credit card account. Will you please verify the following charges?”Whammy. A stolen credit card (yet, still in his wallet). These things happen, I suppose.Luckily, we made out relatively unscathed. Thanks to the magical…

March 28, 2017 | Danielle Russell

StoneDrill: Shamoon Wiper Attacks Reloaded – Notes from the Underground

Nothing can tarnish a great film like a terrible sequel: The Matrix Reloaded, Independence Day II: Resurgence, The Lost World, Weekend at Bernie’s II (seriously, how long can you carry around a corpse in sunglasses?) Terrible sequels seem to surface mysteriously and unwantedly, rehashing the same old story with a slight variation on plot line and cast members.…

March 21, 2017 | Danielle Russell

Hybrid Cloud Security, Part III: A New Approach to Threat Detection in the Cloud

I started rock climbing about five years ago with top ropes. I learned how to belay, how to tie knots, and how to trust my harness, rope, and belay partner to keep me from falling whenever I missed a hold. So, last year, when a new bouldering gym opened in my neighborhood, I was stoked—except for one small…

March 14, 2017 | Danielle Russell

Centralized Logging in the Cloud

Centralized logging is essential to network security and compliance reporting. So, how does log management evolve as you migrate services and workloads to public cloud infrastructure?Not to sound dramatic, but log data is the lifeblood of your security posture. The data captured in the logs of your network devices, systems, and applications feeds into your Security Information and Event…

January 25, 2017 | Danielle Russell

Hybrid Cloud Security, Part II: New Security Challenges Take Shape in the Cloud

When you stare at the clouds long enough, you begin to see things that weren’t there before. There’s a rabbit. Or, maybe it’s a duck. A gust of wind and suddenly, an elephant shapeshifts into a flying saucer.If you look at public cloud infrastructure long enough, you get the same effect.When you…

December 20, 2016 | Danielle Russell

Hybrid Cloud Security, Part One: Familiar Threats in an Unfamiliar Territory

Cloud computing is rapidly becoming a must-have for organizations of all shapes and sizes, making hybrid cloud security a big concern—and often a big question mark—for IT security professionals.A recent IDC report predicted that cloud adoption in organizations will grow 45% by 2018. This prediction is not lost on cyber-attackers, who are constantly adapting their attack methods…

Watch a Demo ›