January 20, 2015 | Joe Schreiber

MSSP Success Series – Make a List

Managed Security Services Providers (MSSPs), like any other business, are a factor of its People, Process, and Product. This series will offer insight into each of those factors and offer practical ways for MSSPs to achieve success - and end users might also find this information helpful. Have A List And Check It Twice! You’ve just closed the…

January 14, 2015 | Kate Brew

General Pace’s Leadership Advice: Take Care of Your People

Retired General and former Chairman of the Joint Chiefs of Staff, Peter Pace, presented at the AlienVault Sales Kick Off (SKO) today. If anyone expected bone-crushing, aggressive militaristic leadership advice from the General, they didn’t get it. General Pace focused on the value of being a caring organization, where leadership gives subordinates direction, and subordinates are empowered to…

Get the latest security news in your inbox.

Subscribe via Email

January 13, 2015 | Varun Kohli

Five Ways to Avoid Next-Gen Mobile Attacks

The Sony hack is the talk of the town these days but just a couple of weeks back CIOs, CSOs and IT managers around the world awoke to alarming news of the largest retail data breach in U.S. history (at least 56 million credit card numbers stolen from Home Depot). In a knee-jerk reaction to the data breach, the Home…

January 8, 2015 | Kate Brew

AlienVault Training - Notes from Class

I recently attained AlienVault Certified Security Analyst (ACSA) and AlienVault Certified Security Engineer (ACSE) certification, after taking an AlienVault 5-day training course and passing a test. It is probably a little biased since I am an AlienVault employee; however, I found the course to be quite good. For an impartial view, check out this 3rd party review. Following are a…

January 6, 2015 | Garrett Gross

Tor: Problematic for IT

Are you aware of everything that your users are accessing from your environment? While most of the time, non-work-related internet browsing is harmless (looking at pictures of cats, online shopping, social media, etc.) there are some instances where you could be an unknowing and unwilling participant in criminal activity. That is, when users hide that activity via the Tor network,…

December 23, 2014 | Clare Nelson

Are Information Security Certifications Worthwhile? Part 2

If you determine that information security certifications will help your career, which ones should you take? What is the right order? In Part 1, I introduced this topic. In Part 2, I suggest you do some research and sleuthing before embarking on a certification exercise. Information security certifications span many categories including general, technical, or audit/risk-oriented. TechTarget’s IT Security…

December 19, 2014 | Garrett Gross

Cloud Atlas - Emerging Threat

Much like the recent Sony breach, we are seeing a lot of techniques used in targeted state sponsored attacks manifesting out in the wild. It seems like these high profile and/or government funded hacks might be laying the blueprint for copycats to use these techniques in other state attacks or even in the private sector. One of these is…

December 18, 2014 | Kate Brew

Ghost of Credit Cards Past: Infographic

Credit card security and fraud are “in the news”, as large-scale data breaches are striking organizations of every type, worldwide. The holiday shopping season can turn from festive to frightening with the simple swipe of a credit card, as fraudsters are seemingly around every corner. Explore facts and statistics about credit and debit cards in the U.S.…

December 17, 2014 | Jeff Weekes

PCI 3.0 Monitoring for “Business as Usual”

Well PCI 3.0 is finally here and your due date for compliance is January 1st, 2015. Are you ready? Answers to this question may vary from yes, no, probably, and I don’t know. Here is another question you can use to evaluate whether you are ready. Does your organization treat PCI compliance as “Business as Usual”? Let&rsquo…

December 15, 2014 | Russ Spitler

Cloud Security: Time to “Wise Up”

The market for cloud, or Internet, computing, in which software and information is available on demand, has surged in recent years. Market research firm IDC expects businesses worldwide to spend $57.4 billion by the end of this year - double that of only a few years previously. Does this signal a brave, new world of 'cloud without borders' and is this…

December 12, 2014 | Garrett Gross

Wiper Malware Takes Down Sony & How To Prevent that from Happening to You

It’s been a busy season in the world of information security, and one of the more notable events was the successful attack on Sony. Initially, it looked like a targeted attack aimed solely at leaking in-theater and unreleased movie titles; not a benign move but definitely something the movie studio could easily recover from. Then we started to…

December 11, 2014 | Andy Nester

Customers get a 24X7 Security Operations Team with GoGrid & AlienVault

Want somebody else to worry about information security for your small or mid-sized business? If you don’t have a crack team of security experts, it might be the best idea, especially with intensifying threats. Instead of having your own people monitor and analyze security alerts 24X7, you can rely on GoGrid’s Managed Security Service and simply…

Watch a Demo ›
Get Price Free Trial