Preparing for Zero Trust and planning your strategy

September 14, 2020 | Kate Brew
Kate Brew

Kate Brew

Editor of AT&T Cybersecurity blog

Kate has over 15 years experience in product management and marketing, primarily in information security.

February 11, 2019 | Kate Brew

Managed Security Trends and Usage

New infographic! The full report is here. …

January 20, 2019 | Kate Brew

Reverse Engineering Malware

The Alien Labs team does a lot of malware analysis as a part of their security research. I interviewed a couple members of our Labs team, including Patrick Snyder, Eddie Lee, Peter Ewane and Krishna Kona, to learn more about how they do it. Here are some of the approaches and tools and techniques they use for reverse engineering malware,…

Get the latest
security news
in your inbox.

Subscribe via email

RSS

January 10, 2019 | Kate Brew

Top 12 Blogs of 2018

Time to look back on the top AlienVault blogs of 2018! Here we go: A North Korean Monero Cryptocurrency Miner by Chris Doman Crypto-currencies could provide a financial lifeline to a country hit hard by sanctions. Therefore it’s not surprising that universities in North Korea have shown a clear interest in cryptocurrencies. Recently the Pyongyang University of Science and…

December 10, 2018 | Kate Brew

Who Would You Hire in Your SOC?

I got curious about what kind of people are most desired in a Security Operations Center (SOC). I wondered how accepting InfoSec blue teamers would be to having a team member with a great attitude and system administration or network management skills, versus someone with deep InfoSec knowledge and skills. So I did a poll on Twitter to learn more.…

October 25, 2018 | Kate Brew

NCSAM Finale: Social Media Sharing Tips

This is the last in our blog series on security awareness to celebrate National Cyber Security Awareness Month (NCSAM). We decided to take on social media sharing tips, and we tapped the Spiceworks community of IT pros for tips and tricks. We made it a contest, with the winner getting a $200 airline voucher. Here is the winning entry: We…

October 17, 2018 | Kate Brew

Best Cloud Tech Jokes and Memes

We ran a contest in Spiceworks recently, asking folks for their best cloud tech jokes. Here are some of the funniest ones: Those SpiceHeads sure have great senses of humor, of a highly techie variety! …

October 15, 2018 | Kate Brew

Security Travel Tips

In honor of NCSAM, we decided to ask the Twitter community for security travel tips, to help us be more safe when travelling. Here's the original Tweet: Want some AlienVault swag? Send us your top tip for #security while traveling by October 8 for potential inclusion in an upcoming blog. Of the tips we include in the blog, we&rsquo…

September 25, 2018 | Kate Brew

Extortion, the Cloud, and the Geopolitical Landscape - Black Hat 2018 Survey Results

At Black Hat 2018, we surveyed attendees on diverse topics ranging from how to react to extortion, what impact the geopolitical landscape is having on the industry, and whether the shiny veneer of the cloud is beginning to fade. Our Security Advocate, Javvad Malik, has put together an excellent report on the survey. The report is based on our…

September 20, 2018 | Kate Brew

Security Risks of Removable Media - Naughty USBs

Carrying on with National Security Cybersecurity Awareness Month (NSCAM), we continue our celebratory blog series. This one is on the dangers the Universal Serial Bus (USB) and other removable media. USBs are called all kinds of things, from thumb drives to memory sticks to USB flash drives. USB’s sure are convenient. They’re tiny and you can…

August 16, 2018 | Kate Brew

Do You Take Security Seriously?

Well Javvad Malik has created another awesome report taking on what taking security seriously actually looks like - both for customers and providers. Here's a little excerpt: The “we take security seriously” line is the security equivalent of the infamous call center “your call is important to us” line. Everybody says…

July 17, 2018 | Kate Brew

Threats, Politics, and Cryptocurrency-Mining - Infosecurity Europe 2018 Survey Results

Javvad Malik and the rest of the AlienVault team surveyed 928 participants at Infosecurity Europe 2018 on this topic. Read the full report from Javvad here! Key Findings Looking forward, cloud security threats are the most concerning external threat Internally, phishing (55%) and ransomware (45%) lead the pack of worries for security departments 92 percent would rather pay a subscription fee, allow ads, or…

June 8, 2018 | Kate Brew

Comparing data security terms: data breach vs compromise vs leak vs security incident

Image courtesy of Bargaineering There seems to be a lack of distinction between a data breach and a security incident in the media of late. While many of the publicized security incidents are true data breaches, some are not. Data breaches are a serious type of security incident that involves the release of personally sensitive, protected and/or confidential data,…