Ransomware experiences and why IT security professionals have a lot on their minds

September 5, 2019 | Rich Langston
Rich Langston

Rich Langston

Rich Langston is a lifelong veteran of the information security wars. His initial introduction came in the late 1980's when the ARPANET network he was responsible for at his part-time college job was completely down because of an insecure default configuration (/.rhost anyone?). Since then, he has helped create security products as diverse as Network Access Control, Full Disk Encryption, and network security at companies such as Cisco, Extreme Networks, Symantec, and Aruba Networks. When not trying to save the world, or blogging about it, he's an avid road cyclist

September 5, 2019 | Rich Langston

Ransomware experiences and why IT security professionals have a lot on their minds

Every year we survey visitors to our booth at Black Hat about trending topics.  This year, we asked about ransomware and the ever-increasing complexity of our cybersecurity environment.  The results are very interesting - things may be getting much better, or we may all be collectively in denial.  Let's break it down. We surveyed 145 IT security…

April 8, 2019 | Rich Langston

Understanding “container security”

Containers and container security Do you docker? Without a doubt, containers are one of the hottest concepts in application delivery and security these days. And that’s a very good thing. Containers have tremendous advantages over the way we have done things in the past. But how should containers influence a threat detection and response strategy? Do I need…

Get the latest security news in your inbox.

Subscribe via Email

November 15, 2018 | Rich Langston

Defending Against Zero-Day Attacks with AlienVault USM Anywhere

Introduction Recently, an AlienVault customer reached out to ask how AlienVault handles the detection of  zero-day attacks, which are exploits against previously unknown vulnerabilities. In this blog, I shed light on how we approach this. Modern security products rely on some definition of threats, whether that definition is as specific as a signature that identifies a unique strain of…

Watch a Demo ›
Get Price Free Trial