Danielle Russell | AlienVault Blogs
Danielle Russell

Danielle Russell

Senior Product Marketing Manager

Danielle is a Senior Product Marketing Manager at AlienVault, responsible for product messaging and positioning, go-to-market strategy, and sales enablement. Prior to AlienVault, Danielle held a marketing leadership position with an IT software company in the telecommunications industry. Danielle earned a B.S. Life Sciences Communication from the University of Wisconsin.

July 5, 2018 | Danielle Russell

Simplify Compliance Reporting with AlienVault USM Anywhere

USM Anywhere delivers a comprehensive library of predefined compliance report templates for PCI DSS, HIPAA, NIST CSF, and ISO 27001, so you can accelerate your security and compliance programs and be audit-ready faster. It also includes 50+ predefined event reports by data source and data source type, helping to make your daily monitoring and reporting activities more eficient.In addition to predefined…

May 31, 2018 | Danielle Russell

AlienVault Monthly Product Roundup May 2018

We regularly introduce new features to USM Anywhere and USM Central to help your team to be more effective at detecting and responding to threats. You can keep up with our regular product releases by reading the release notes in the AlienVault Product Forum. Here are a few of the highlights from our May 2018 releases:New Alarm Management Capabilities in…

Get the latest security news in your inbox.

Subscribe via Email

May 1, 2018 | Danielle Russell

AlienVault Monthly Product Roundup April 2018

We are continuously making improvements and rolling out new features to USM Anywhere to help your team to be more effective at detecting and responding to threats. You can keep up with USM Anywhere releases by reading our release notes in the AlienVault Product Forum. Here is a roundup of the highlights from our April 2018 releases:Go Threat Hunting with…

April 17, 2018 | Danielle Russell

New! Free Threat Hunting Service from AlienVault – OTX Endpoint Threat Hunter™

70% of successful security breaches start on endpoint devices, according to IDC.1 Yet, security practitioners haven’t had an effective or low-cost way to hunt for threats against critical endpoints. Until now.Today, I am excited to announce a new free service for endpoint threat scanning—OTX Endpoint Threat Hunter™.OTX Endpoint Threat Hunter is a free threat-scanning…

March 22, 2018 | Danielle Russell

Forrester Study: Breaking Down the Total Economic Impact of AlienVault USM

There’s just something about InfoSec that attracts the skeptics, the leery, the Agent Scullys among us. Perhaps this natural tendency to distrust is what makes security analysts so keen at threat hunting, so perceptive to see a glimmer of anomalous activity in a stream of “normal.”It’s perhaps this same tendency to distrust that…

November 7, 2017 | Danielle Russell

New AlienVault USM Anywhere™ Editions Expand Pricing and Deployment Flexibility for All

AlienVault was founded on the belief that every organization deserves a strong security posture, regardless of the size of their IT environment or the size of their IT security budget. We pioneered Unified Security Management® (USM) so that resource-limited IT security teams could meet their security and compliance goals without the cost and complexity of managing multiple point…

August 16, 2017 | Danielle Russell

GlobeImposter Ransomware on the Rise

Ah, the summer anthem. That quintessential song that defines summertime as much as hot nights, barbeques, and beach vacations. Whether it’s the Beach Boys’ “I Get Around” (1964), Springsteen’s “Dancing in the Dark” (1984), or Pearl Jam’s “Last Kiss” (1999), the summer anthem is transcendent, yet perfectly emblematic of its…

June 21, 2017 | Danielle Russell

A RAT that Tweets: New ROKRAT Malware Hides behind Twitter, Amazon, and Hulu Traffic

To carry out attacks, malware and botnets rely on communication with a Command & Control server (C&C or C2) to receive instructions. As a result, today’s security tools have become extremely adept at detecting traffic to and from malicious IP addresses. When a system or device starts talking to a malicious IP or domain, alarms sound…

May 15, 2017 | Danielle Russell

The Power of Community: My Real-Life Lesson in Community-Sourced Threat Intelligence

Last week, my husband received the dreaded call from our bank.“Hello Mr. Smith. We’ve noticed some unusual activities on your credit card account. Will you please verify the following charges?”Whammy. A stolen credit card (yet, still in his wallet). These things happen, I suppose.Luckily, we made out relatively unscathed. Thanks to the magical…

March 28, 2017 | Danielle Russell

StoneDrill: Shamoon Wiper Attacks Reloaded – Notes from the Underground

Nothing can tarnish a great film like a terrible sequel: The Matrix Reloaded, Independence Day II: Resurgence, The Lost World, Weekend at Bernie’s II (seriously, how long can you carry around a corpse in sunglasses?) Terrible sequels seem to surface mysteriously and unwantedly, rehashing the same old story with a slight variation on plot line and cast members.…

March 21, 2017 | Danielle Russell

Hybrid Cloud Security, Part III: A New Approach to Threat Detection in the Cloud

I started rock climbing about five years ago with top ropes. I learned how to belay, how to tie knots, and how to trust my harness, rope, and belay partner to keep me from falling whenever I missed a hold. So, last year, when a new bouldering gym opened in my neighborhood, I was stoked—except for one small…

March 14, 2017 | Danielle Russell

Centralized Logging in the Cloud

Centralized logging is essential to network security and compliance reporting. So, how does log management evolve as you migrate services and workloads to public cloud infrastructure?Not to sound dramatic, but log data is the lifeblood of your security posture. The data captured in the logs of your network devices, systems, and applications feeds into your Security Information and Event…

Watch a Demo ›