Top 12 AlienVault Blogs of 2015

January 5, 2016 | Kate Brew
X

Get the latest security news in your inbox.

Subscribe via Email

No thanks. Close this now.

top alienvault blogs of 2015As 2015 draws to a close, we reminisce on our year of blogging. We blogged on so many interesting infosec topics, from Waterholes to PenTesting to threat intelligence beyond the hype. and shared security research in the Labs Blog. We are looking forward to providing more educational and useful blogs in 2016. As in 2015, we welcome and support guest bloggers who have contributions to make to the infosec community. Please subscribe to our blog to get all the new goodies in 2016. Here are the top 12 AlienVault blogs of the year:

  1. Watering holes exploiting JSONP highacking to track users in China. - Jaime Blasco shares AlienVault Labs research in this top blog of the year, on series of watering hole attacks that target NGO, Uyghur and Islamic websites
  2. IT Jokes from Spiceworks - This is a compendium of IT humor collected from the Spiceworks community. Not heavy on infosec content, but a definite crowd-pleaser.
  3. KilerRat: Taking over where Njrat remote access trojan left off - Peter Ewane, new to the AlienVault Labs team, shares interesting security reseach in his first AlienVault blog.
  4. IDS, IPS and UTM - What's the Difference? - Grant Leonard of Castra wrote this educational guest blog to help people understand the nuances and realities, especially between IDS and IPS.
  5. ElasticZombie Botnet - Exploiting Elasticsearch Vulnerabilities - Markus Manzke, with German partner 8ack, shares his research in this technical blog.
  6. Free and Commercial Tools to Implement the SANS Top 20 Security Controls, Part 1 - Rich Johnson, member of the Spiceworks community and guest blogger, shares lots of tool ideas for implementing the SANS security controls in this blog series.
  7. Penetration Testing vs. Vulnerability Scanning - What's the Difference? - Marcus Carey, CEO of vThreat, tells a story that people of all backgrounds will understand to explain the difference between pen testing and vulnerability scanning.
  8. Open Threat Exchange (OTX) - Now Including Social Sharing of Threat Data - Jaime Blasco unveils the new release of OTX in this blog, highlighting the new features.
  9. Dynamic DNS Security and Potential Threats - Tony Robinson shares his research on DNS security in this educational guest blog.
  10. 2015 Gartner Magic Quadrant for SIEM: Visionary Aliens - Javvad Malik recaps the 2015 Gartner MQ for SIEM, which includes AlienVault USM.
  11. AWS Intrusion Detection (IDS) - In this blog, Russ Spitler addresses the interesting issues around intrusion detection with AWS cloud and the shared security model.
  12. Threat Intelligence - Beyond the Hype - Michael Roytman, guest blogger from Kenna, does an interesting analysis on threat intelligence from a vulnerability researcher's standpoint.
Kate Brew

About the Author: Kate Brew

Kate has over 15 years experience in product management and marketing, primarily in information security.

Read more posts from Kate Brew ›

TAGS:

‹ BACK TO ALL BLOGS

Watch a Demo ›
Get Price Free Trial