Julia Kisielius

Julia Kisielius

Product Marketing Manager

Julia joined AlienVault as a Product Marketing Manager in February 2017. Previously, she was a product manager at Giving Docs, an early-stage startup that makes fundraising software for nonprofits. Before that, she worked on data products and processes to help Tufts University fundraisers raise more than $80M per year. Julia started her career at an asset management firm with $200M under management, where she researched, edited, fact-checked, and promoted financial literacy resources such as books and columns. She graduated from the University of Connecticut with a B.A. in English.

https://alienvault.com

November 26, 2018 | Julia Kisielius

AlienVault Delivers Phenomenal Cloud Security for AWS Customers

Viva Las Vegas! We aliens have landed at AWS re:Invent 2018 (Booth #1506), bringing phenomenal threat detection, response, and compliance to the AWS cloud. As I gear up for a full day of live product demos, I thought I’d take a moment to highlight some of the ways in which AlienVault is delivering phenomenal security to our customers’…

October 30, 2018 | Julia Kisielius

AlienVault Open Threat Exchange Hits Major Milestone with 100,000 Participants

Today, I’m excited to announce that AlienVault® Open Threat Exchange® (OTX™) has grown to 100,000 global participants, representing 36% percent year-over-year growth. AlienVault OTX, launched in 2012, is the world’s first free threat intelligence community that enables real-time collaboration between security researchers and IT security practitioners from around the world. Every day, participants  from…

Get the latest security news in your inbox.

Subscribe via Email

October 3, 2018 | Julia Kisielius

AlienVault Agent Now Has Improved Filtering Capabilities

On July 31st, we publicly launched new endpoint detection and response (EDR) capabilities in USM Anywhere, AlienVault’s unified solution for complete threat detection, response, and compliance. With EDR built into USM Anywhere, users can centralize security monitoring of their endpoint and network activities across cloud and on-premises environments, without the need to deploy, integrate, and manage a separate…

July 10, 2017 | Julia Kisielius

Incident Response Automation Challenges (and How USM Anywhere Can Help)

According to the SANS 2017 Incident Response Capabilities Survey, 47% of organizations reported taking more than 24 hours to move from detecting an incident to containing it. Given that every minute between compromise and containment represents potential data exposure and damage, these results reveal a serious need to shorten incident response times.At the same time, security teams face significant obstacles to swift…

June 26, 2017 | Julia Kisielius

Automated Incident Response in Action: 7 Killer Use Cases

Picture this: It’s 2AM on Saturday and you’re startled awake by an alert on your phone. Indicators of a new variant of WannaCry ransomware have been detected in your network. But your home network provider is having an outage (again!) and you can’t remote in. You get dressed and race to office, maybe breezing…

May 30, 2017 | Julia Kisielius

Incident Response Orchestration: What Is It and How Can It Help?

The other day, I invited about twelve friends to my apartment for dinner—on a weeknight. “Don’t worry about bringing anything,” I assured everyone. “I can handle it myself.”As it turns out, I couldn’t.While I had plenty of food on hand, I’d never cooked such a large…

April 25, 2017 | Julia Kisielius

The Felismus RAT: Powerful Threat, Mysterious Purpose

This week, my colleagues and I furiously investigated the mystery of Felismus, a sophisticated, well-written piece of malware discovered recently by researchers at Forcepoint Labs. The malware’s modular, self-updating construction is a nod to the apparent skill of its creators and the severe risk it poses to victims.While little has been uncovered so far about Felismus&rsquo…

February 27, 2017 | Julia Kisielius

GhostAdmin: The Invisible Data Thief - Notes from the Underground

Data theft is a major threat to businesses in today’s economy. With large corporations like Arby’s, Popeye’s, and Intercontinental Hotels all reporting breaches since the beginning of this year alone, it’s essential for IT professionals to keep an eye out for emerging threats that target valuable user data.Just last month, researchers…

Watch a Demo ›
GET PRICE FREE TRIAL