March 30, 2015 | Garrett Gross

Release the Kraken!!!!!

We all know how difficult it is to keep your users from downloading malicious files and/or visiting suspect websites even when you tell them explicit things to look out for (malformed urls, executables, files with multiple extensions, etc). What if the actual malware payload is hidden in Microsoft Office documents that your users send and receive thousands of times…

March 26, 2015 | Cheryl Biswas

Security for Non-Profit Organizations: 10 Tips to Help Those Who Help Others

After the massive breaches and attacks of last year, everyone has become far more aware of their vulnerability to being hacked. Security has taken on new meaning as people start putting defensive measures in place. Yet for many, especially those in the Non-Profit sector, this still seems a daunting task due to the perceived costs and skills required to know…

Get the latest security news in your inbox.

Subscribe via Email

March 24, 2015 | Clare Nelson

Is Your Multi-Factor Authentication Solution the Real Thing?

In infosec, multi-factor authentication is often considered a positive, constructive element of layered security. However, some people have an oversimplified view. With multi-factor authentication, there are many nuances to consider. At BSides Austin I presented on this topic. When shopping for a multi-factor authentication solution, what should you look for? There are over 200 multi-factor authentication vendors, how do you evaluate…

March 20, 2015 | Jaume Ayerbe

El confuso panorama de la ciberseguridad

El otro día me vino a la cabeza una cita del genial Gabriel García Márquez: La sabiduría nos llega cuando ya no nos es de utilidad Seguro que Gabo no estaba pensando en las situaciones que diariamente tenemos que afrontar los profesionales de la seguridad de los sistemas de información,…

March 20, 2015 | Jaume Ayerbe

The State of Cybersecurity and Confusion

To read this blog in Spanish, please look here. The brilliant mind of Gabriel García Marquez, known affectionately as Gabo, produced a short and vivid quote: Wisdom enlightens us when it is not useful anymore Obviously his mind was not thinking about the chores that probably you have to deal with on your day job, yet I would…

March 19, 2015 | Joe Schreiber

Intrusion Detection (IDS) for Analysts

IDS device installed? Check. IDS seeing traffic? Check. IDS generating Events? Check. Analysts investigating Events? Ummm….. Investigating IDS alerts is a process like any other; however the variable nature of Information Security often makes this process difficult to adhere to. Maintaining this process is the first step to managing your IDS and its generated events. Let’s examine…

March 18, 2015 | Susan Torrey

CeBit and AlienVault Partnership with Deutsche Telekom and T-Systems

It’s been an exciting week for AlienVault at CeBit, we announced a partnership with Deutsche Telekom and T-Systems, the ICT division of Deutsche Telekom, to provide ‘German Mittelstand’ mid-market customers with the ability to detect and mitigate the impact of a breach. The new offering, Cyber Defense (CD), which leverages AlienVault Unified Security Management platform, was…

March 17, 2015 | Garrett Gross

Emerging Threat - FREAK

There is quite a buzz around the newly disclosed FREAK (Factoring attack on RSA Export Keys) vulnerability, affecting major browsers, servers, and even mobile devices. When exploited, this vulnerability allows an attacker to force you (or the systems in your environment) to downgrade to a weaker grade of encryption, giving the attacker a better chance of decrypting (and then stealing)…

March 13, 2015 | Kate Brew

BSides Austin 2015 - Security is Our Anthem!

There was a large and enthusiastic audience for BSides Austin 2015! Keynote, Wendy Nather, presenting “10 Crazy Ideas for Fixing Security.” Wendy discussed “new technologies that really aren’t”, and suggested we remember the past and move on. She discussed the “literary model of software development”, noting programmers are currently somewhat like artisans, suggesting a…

March 10, 2015 | Kate Brew

Crosskey Gains Visibility & Combats Banking Malware with Threat Intelligence

Crosskey is a Finnish company that develops, delivers and maintains systems and solutions for Nordic banks and capital markets. Customers range from small and regional banks to the third largest bank in Finland. Altogether, Crosskey deals with the management of over 3 million banking customers (half of Finland's population) in the Nordic region. Malware targeting financial institutions, like Crosskey, is…

March 6, 2015 | Patrick Bedwell

The Ongoing Debate about the Gap between Compliance and Security

Companies required to comply with the Payment Card Industry Data Security Standard (PCI DSS) must meet a wide range of technical and operation requirements. The challenge organizations face regarding PCI compliance has shifted from achieving the minimum level required to satisfy PCI audit requirements to incorporating security best practices into everyday activities. Otherwise, the potential exists to achieve compliance yet…

March 5, 2015 | Garrett Gross

Emerging Threat - Superfish

It’s a given that nobody likes adware loaded on their new systems by the manufacturer but usually, it is no more than a nuisance and can be easily removed in most cases. However, when that software includes a major security flaw, making man-in-the-middle attacks infinitely easier to carry out, you have a major issue on your hands. Just…

Watch a Demo ›
Get Price Free Trial