Malware Hiding Techniques to Watch for: AlienVault Labs

October 3, 2016 | Kate Brew
Kate Brew

Kate Brew

Editor-in-chief, AlienVault blog

Kate has over 15 years experience in product management and marketing, primarily in information security.

https://twitter.com/securitybrew

March 26, 2019 | Kate Brew

Great find! The ThreatTraq Internet Weather Report

Every week, the AT&T Chief Security Office produces a set of videos with helpful information and news commentary for InfoSec practitioners and researchers.  I really enjoy them, and penned a blog on a segment on the impact the banning of smartphones in some secure federal facilities  a few weeks ago. The Internet Weather Report is a…

March 8, 2019 | Kate Brew

Ban on Smartphones in Secure Federal Facilities

The Federal ban on smartphones for some employees in the workspace makes a lot of sense in post-Snowden days. The phone has a camera, microphone, Bluetooth and other capabilities that can be abused, with or without the employee even intending harm. AT&T ThreatTraq did a six-minute video I really enjoyed. ThreatTraq is a production of the…

Get the latest security news in your inbox.

Subscribe via Email

February 21, 2019 | Kate Brew

Fileless Malware Detection: A Crash Course

Given you’re here, you’re likely new to this topic, so please be aware in that fileless malware, fileless malware attack, and fileless attack are different words for the same thing. With that clear, let’s jump in!  What is Fileless Malware and How Does It Work? There are many definitions of a fileless malware…

February 11, 2019 | Kate Brew

Managed Security Trends and Usage

New infographic! The full report is here. …

January 10, 2019 | Kate Brew

Top 12 Blogs of 2018

Time to look back on the top AlienVault blogs of 2018! Here we go: A North Korean Monero Cryptocurrency Miner by Chris Doman Crypto-currencies could provide a financial lifeline to a country hit hard by sanctions. Therefore it’s not surprising that universities in North Korea have shown a clear interest in cryptocurrencies. Recently the Pyongyang University of Science and…

December 10, 2018 | Kate Brew

Who Would You Hire in Your SOC?

I got curious about what kind of people are most desired in a Security Operations Center (SOC). I wondered how accepting InfoSec blue teamers would be to having a team member with a great attitude and system administration or network management skills, versus someone with deep InfoSec knowledge and skills. So I did a poll on Twitter to learn more.…

October 25, 2018 | Kate Brew

NCSAM Finale: Social Media Sharing Tips

This is the last in our blog series on security awareness to celebrate National Cyber Security Awareness Month (NCSAM). We decided to take on social media sharing tips, and we tapped the Spiceworks community of IT pros for tips and tricks. We made it a contest, with the winner getting a $200 airline voucher. Here is the winning entry: We…

October 17, 2018 | Kate Brew

Best Cloud Tech Jokes and Memes

We ran a contest in Spiceworks recently, asking folks for their best cloud tech jokes. Here are some of the funniest ones: Those SpiceHeads sure have great senses of humor, of a highly techie variety! …

October 15, 2018 | Kate Brew

Security Travel Tips

In honor of NCSAM, we decided to ask the Twitter community for security travel tips, to help us be more safe when travelling. Here's the original Tweet: Want some AlienVault swag? Send us your top tip for #security while traveling by October 8 for potential inclusion in an upcoming blog. Of the tips we include in the blog, we&rsquo…

September 25, 2018 | Kate Brew

Extortion, the Cloud, and the Geopolitical Landscape - Black Hat 2018 Survey Results

At Black Hat 2018, we surveyed attendees on diverse topics ranging from how to react to extortion, what impact the geopolitical landscape is having on the industry, and whether the shiny veneer of the cloud is beginning to fade. Our Security Advocate, Javvad Malik, has put together an excellent report on the survey. The report is based on our…

September 20, 2018 | Kate Brew

Security Risks of Removable Media - Naughty USBs

Carrying on with National Security Cybersecurity Awareness Month (NSCAM), we continue our celebratory blog series. This one is on the dangers the Universal Serial Bus (USB) and other removable media. USBs are called all kinds of things, from thumb drives to memory sticks to USB flash drives. USB’s sure are convenient. They’re tiny and you can…

August 16, 2018 | Kate Brew

Do You Take Security Seriously?

Well Javvad Malik has created another awesome report taking on what taking security seriously actually looks like - both for customers and providers. Here's a little excerpt: The “we take security seriously” line is the security equivalent of the infamous call center “your call is important to us” line. Everybody says…

Watch a Demo ›
Get Price Free Trial