Profile cover photo
Profile photo
AlienVault
790 followers -
Security for you, powered by all!
Security for you, powered by all!

790 followers
About
Posts

Post has attachment

#IT pros and bacon lovers alike, check out today's blog from our Events Manager Holly Barker on what's happening with AlienVault at SpiceWorld this week. Stop by booth #10, and don't miss "Realities of the Digital Transformation: How to Address the Threats We Face Today” with Jaime Blasco, VP and Chief Scientist of AlienVault, and Todd Waskelis, AVP, AT&T Security Solutions and Spiceworks (moderator) on Tuesday, October 9th @ATTBusiness http://ow.ly/EOkc30m91Ho
Photo
Add a comment...

Post has attachment

What can your out-of-office notification reveal? Find out in Javvad Malik's "Things I Hearted this Week" blog, along with how to test IKEA's web security and more infosec news and commentary http://ow.ly/vMsx30m7aHr
Photo
Add a comment...

Post has attachment

The MITRE ATT&CK framework has gained steady adoption in the past two years, providing tactics and techniques bad actors may use. What are the top 5 use cases? Marcus Carey from Threatcare discusses in new guest blog http://ow.ly/8eh330m6r1k
Photo
Add a comment...

Post has attachment
AlienVault today introduced new filtering capabilities enabled by the AlienVault Agent in its USM Anywhere Threat Detection platform. These capabilities provide additional control over data consumption. Learn more about how to use filtering with AlienVault Agent in today's blog post from Julia Kisielius, AlienVault Product Marketing Manager http://ow.ly/5FcZ30m5aGw
Photo
Add a comment...

Post has attachment

Malware services is where the money is! New guest blog by Mike Duffy, CEO of Barkly, addresses 3 big changes in cybercrime putting small businesses at risk hhttp://ow.ly/pnK130m45yd
Photo
Add a comment...

Post has attachment
How transparent is your company's DevSecOps process? Today's guest blog from Noah Beddome from Datadog addresses transparency and other important success factors for DevSecOps including observability
http://ow.ly/LAGt30m3aru
Photo
Add a comment...

Post has attachment
With National Cybersecurity Awareness Month starting next week, today's guest blog from Bob Covello discusses changing the approach of "user awareness" and treating the disease instead of the patient. Let us know what you think http://ow.ly/qPS230lZZoQ
Photo
Add a comment...

Post has attachment

How confident would your company be in calling a hacker's ransomware bluff? Our new Black Hat 2018 survey report written by Javvad Malik addresses extortion, cloud challenges and the impact of the geopolitical landscape http://ow.ly/M8S330lXRtg
Photo
Add a comment...

Post has attachment
New MadoMiner cryptomining malware earns $6,015 a month, while only mining at 50% power; Labs guest blog by James Quinn analyzes how it installs and infects systems, and what security analysts can do to detect it http://ow.ly/pIML30lX6gL
Photo
Add a comment...

Post has attachment

What can security analysts do about alert fatigue?
New guest blog by Charles Humphrey offers tips for combatting false positives, tuning best practices, the importance of threat intelligence and more http://ow.ly/271G30lWIVf
Photo
Add a comment...
Wait while more posts are being loaded