May 13, 2014 | Lauren Barraco

Top 4 Security Questions to Ask of Your Data (and The Data You Need to Answer Them)

The security industry has an unhealthy love affair with complexity and sophistication. Blame it on the media, or our own tendency towards masochism... but, whatever the reason, it seems that most are more interested in putting most of our time and attention on Advanced Persistent Threats or zero day attacks than in implementing basic security practices. The sad truth is…

May 6, 2014 | Patrick Bedwell

Vulnerability Management Programs and New Age Hackers

Back in the day, hackers really didn't think to gain by their activities – they broke into systems or web sites for fun and to show off their capabilities.  While this situation was pesky, it turned out that things can always be worse.  Now, with the emergence over the last several years of attackers with an agenda…

Get the latest security news in your inbox.

Subscribe via Email

April 29, 2014 | James Taliento

Using OSSIM to Hone Your Security Skills

When you think of SIEM, some of us automatically assume that it's just another tool deployed into a SOC (Security Operations Center) that is used by security analysts and incident responders to identify and react to events occurring on their network. That wouldn't be a false assumption, however, there are practical applications for using an open source security tool such…

April 27, 2014 | Barmak Meftah

From ISAC to ISAE: Let’s turn that word “Center” into “Exchange” and open the floodgates to all

Threat intelligence sharing is a hot topic right now, made all the more relevant by the series of high profile breaches that have plagued the retail industry since December. Target, Neiman-Marcus, Sally Beauty, Michael’s, Aaron Brothers… no doubt, more to come. These breaches have been covered by the media extensively, and there’s not much more…

April 24, 2014 | Joe Schreiber

MSSP - The New Acceptance

Wait, you want my keys? You'll just watch my house? I'm okay with that! From my last post you know I previously worked for a MSSP, but I've been on the other side working with them as well. Furthermore I've staffed and cultivated analysts working inside MSSPs, created Incident Response systems and developed Metrics (fun, fun…

April 22, 2014 | Lauren Barraco

File Integrity Monitoring - Because Bad Guys are Sneaky

Sadly, perpetrators of malicious changes in IT don't just announce themselves. While on the surface, File Integrity Monitoring (FIM) doesn't appear all that sexy to security practitioners, it is a great way to deal with sneaky bad guys. It's forensic in nature - providing the ability to look at changes after-the-fact to figure out what happened. The…

April 15, 2014 | Lauren Barraco

Top 5 Problems with Traditional SIEM (Infographic)

Unlike security cameras, going from installation to insight with a traditional SIEM is far from straightforward. In this infographic, we’ll cover a few common problems with SIEM technologies, and how you can avoid those pitfalls with AlienVault Unified Security Management. SIEM is too complex. Collecting the right data, aggregating it, normalizing and correlating disparate technologies for that one…

April 11, 2014 | Jaime Blasco

What should I do about Heartbleed?

Heartbleed is not an exploit you want to ignore as an IT professional. It exposes passwords and cryptographic keys, and requires not only that you patch OpenSSL for each of the services using the OpenSSL library, but also that you replace the private keys and certificates so that attackers won’t be able to use any of the data…

April 10, 2014 | Jim Hansen

Windows XP End-of-Life: How USM and OTX can help avoid the security armageddon - Part 2

This is the second of a two-part blog focused specifically on Windows XP end-of-life. Recently, I sat down with our Director of Sales Engineering, Tom D’Aquino, to talk about the Windows XP End-of-Service that has everybody riled up. The end of service date should be no surprise. Microsoft has a pretty well-defined software lifecycle policy, and they make…

April 8, 2014 | Jim Hansen

Windows XP end-of-life: Security armageddon or just another day in the trenches? Part 1

This is the first of a two-part blog focused specifically on Windows XP end-of-life. When Microsoft announced their decision to End-of-Life Windows XP on April 8th, 2014, it caused quite the media stir, and continues to as we reach that date. I decided to sit down with our Director of Sales Engineering, Tom D’Aquino, to talk about what exactly…

March 25, 2014 | Conrad Constantine

Better than SIEM: Unified Security Management

In Part 1 of this series, we discussed what a SIEM actually is. In Part 2, we discussed what kind of logs you need for an effective SIEM implementation. So life should be grand, right? Nope, the big problem is that most systems’ log files don’t contain entries that say, “Help! Help! I’m being attacked!”…

March 19, 2014 | Russ Spitler

A practical approach to the Windows XP ‘Security Cliff’

There is an increasing amount of noise related to what it means when Microsoft stops releasing security patches for XP. While a lot of this noise is doom and gloom it is also important to look at this from a practical perspective and determine exactly what we can do to see ourselves through this transition safely. As hard as we…

Watch a Demo ›
Get Price Free Trial