What is File Integrity Monitoring? Tools, open source, best practices explained

March 6, 2020 | Jim Hansen

Author: Jim Hansen

March 6, 2020 | Jim Hansen

What is File Integrity Monitoring? Tools, open source, best practices explained

We hear a lot in the news today about how important it is to make sure that critical files have not been tampered with – whether its malware, hackers, or employees/contractors - if we can be alerted the moment critical system files and sensitive data files have experienced unauthorized changes, then we’ve gone a long way in…

December 29, 2016 | Jim Hansen

GoldenEye Ransomware: Shaken, Not Stirred - Notes from the Underground

What do action, adventure, cool gadgets, Vodka martinis—shaken not stirred—and ransomware all have in common? One word – GoldenEye. For my fellow Gen Xers, you probably remember this iconic James Bond film starring Pierce Brosnan as 007. I sure do. It was one of the best James Bond films ever made. The film involved an insidious plot by malicious actors…

Get the latest security news in your inbox.

Subscribe via email


November 15, 2016 | Jim Hansen

Ransomware+: A New Shade of Evil

Ransomware has become an ever growing topic of conversation and concern in the security community during the last several years. According to the ZDNet article earlier this year — Ransomware is now the biggest cybersecurity threat — Danny Palmer asserts that ransomware has replaced the Advanced Persistent Threat (APT) as the most problematic cyber threat. He’s not wrong. Ransomware has become…

July 26, 2016 | Jim Hansen

Open Threat Exchange (OTX) Introduces New Features

AlienVault is releasing another major new feature called Private Groups in Open Threat Exchange (OTX) today. This new feature allows users within OTX to create a private group of other OTX users and control access to the threat data shared within that group. Threat data contained within the private group stays in the private group and is not shared more…