March 22, 2019 | Javvad Malik

Things I hearted this week, 22 March 2019

RSA has come and gone, and things are settling down into a normal routine. I did write a post-RSA blog which covered the highlights and trends I observed.Because of RSA and the subsequent week of getting through the backlog of emails and work, the news list has piled up with over 141 separate news items lined up in my list.…

March 20, 2019 | Bob Covello

Restart BEFORE patching

Most folks who work with servers know the monthly drill:Patches are released by manufacturers -> Patches are tested -> Patches are deployed to Production.  What could possibly go wrong?Anyone who has ever experienced the nail-biting joy of patching, and then awaiting a restart, knows exactly what could go wrong.  Does anyone remember the really…

Get the latest security news in your inbox.

Subscribe via Email

March 19, 2019 | Carisa Brockman

The NIST cybersecurity framework (CSF) and what it can do for you

The NIST Cybersecurity Framework (CSF) has only been around for four years and while developed for critical infrastructure, resulting from Executive Order 13636, it has been widely adopted across both private and public sectors and organizational sizes.  It is used inside of the US government, with 20 states using it (at last count). In addition, international organizations such as the Italian…

March 18, 2019 | Kim Crawley

All about security analytics

With or without a security operations center, and whether your network is on premises, in the cloud, or a hybrid, you need to determine which events and indicators correlate with cyber attacks. Organizations these days face a wider range and greater frequency of cyber threats than ever before. These threats can be from APTs (advanced persistent threats), cyberwarfare, promiscuous attacks…

March 15, 2019 | Javvad Malik

RSA 2019 - A Case of the Blues

RSA is arguably the biggest business-focussed cyber security event of the year. As over 40,000 security professionals completely take over the Moscone Centre in San Francisco.Of course, one of the biggest changes this year was a case of the blues - as AlienVault made its transition into AT&T Cybersecurity. There were smiles all around, and the now blue…

March 14, 2019 | Tom Hegel

Making it Rain - Cryptocurrency Mining Attacks in the Cloud

By Chris Doman and Tom HegelOrganizations of all sizes have made considerable shifts to using cloud-based infrastructure for their day-to-day business operations. However, cloud security hasn't always kept up with cloud adoption, and that leaves security gaps that hackers are more than happy to take advantage of.One of the most widely observed objectives of attacking an organization'…

March 14, 2019 | Mike LaPeters

AT&T Cybersecurity partner of the year 2018

I am very excited to announce the 2018 AT&T Cybersecurity (formerly AlienVault) Partners of the Year! These eight outstanding companies achieved phenomenal business growth during 2018 and truly reflect the types of organizations that believe in ‘customers first’.The AT&T Cybersecurity Partner Program enables leading VARs, system integrators, managed security service providers (MSSPs), managed detection and…

March 8, 2019 | Kate Brew

Ban on Smartphones in Secure Federal Facilities

The Federal ban on smartphones for some employees in the workspace makes a lot of sense in post-Snowden days. The phone has a camera, microphone, Bluetooth and other capabilities that can be abused, with or without the employee even intending harm.AT&T ThreatTraq did a six-minute video I really enjoyed. ThreatTraq is a production of the…

March 7, 2019 | Kenneth Coe

Announcing the AlienVault Success Center!

We are very excited to announce that our new Success Center has just launched. It is our new “one stop shop” for help for AT&T Cybersecurity commercial USM Anywhere, USM Appliance and USM Central customers, OTX and OSSIM users, and InfoSec practitioners in need of help and support.Why a Success Center?We studied the situation…

March 6, 2019 | Chris Doman

Internet of Termites

Termite is a tool used to connect together chains of machines on a network. You can run Termite on a surprising number of platforms including mobile devices, routers, servers and desktops.That means it can be used used to bounce a connection between multiple machines, to maintain a connection that otherwise wouldn’t be possible:Termite is a useful…

March 6, 2019 | Bindu Sundaresan

6 Reasons you Should Consider an Annual Penetration Testing Especially in Healthcare

Breaches are widely observed in the healthcare sector and can be caused by many different types of incidents, including credential-stealing malware, an insider who either purposefully or accidentally discloses patient data, or lost laptops or other devices. Personal Health Information (PHI) is more valuable on the black market than credit card credentials or regular Personally Identifiable Information (PII)..With instances…

March 5, 2019 | Javier Ruiz

Mapping TrickBot and RevengeRAT with MITRE ATT&CK and AlienVault USM Anywhere

MITRE ATT&CK™ (Adversarial Tactics, Techniques and Common Knowledge) is a framework for understanding attackers’ behaviors and actions.We are pleased to announce that AlienVault USM Anywhere and Open Threat Exchange (OTX)  now include MITRE ATT&CK™ information. By mapping alarms to their corresponding ATT&CK techniques,…

Watch a Demo ›
Get Price Free Trial