Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Tripwire Products: Quick Reference Guide

Here at The State of Security, we cover everything from breaking stories about new cyberthreats to step-by-step guides on passing your next compliance audit. But today, we’d like to offer a straight-forward roundup of the Tripwire product suite. Get to know the basics of Tripwire’s core solutions for FIM, SCM, VM and more. Without further ado…

Security Orchestration, Automation and Response (SOAR) - The Pinnacle For Cognitive Cybersecurity

The cognitive tools/technologies of machine learning (ML) and artificial intelligence (AI) are impacting the cybersecurity ecosystem in a variety of ways. Applied AI machine learning and natural language processing are being used in cybersecurity by both the private and public sectors to bolster situational awareness and enhance protection from cyber threats. The algorithmic enablers that make ML and AI pinnacles of cybersecurity are automation and orchestration.

SFTP: The Future of Large Data Transfers

In a world where sharing files is as easy as clicking a link, it’s hard to imagine using older services like FTP. Believe it or not, FTP and its derivatives, FTPS, FTPES and SFTP, are still widely preferred for processes like bulk file/folder transfers. To understand why FTP and SFTP are still relevant, it’s important to first know what makes each subsidiary unique. So, let’s explore the differences between them.

AlienVault Delivers Phenomenal Cloud Security for AWS Customers

Viva Las Vegas! We aliens have landed at AWS re:Invent 2018 (Booth #1506), bringing phenomenal threat detection, response, and compliance to the AWS cloud. As I gear up for a full day of live product demos, I thought I’d take a moment to highlight some of the ways in which AlienVault is delivering phenomenal security to our customers’ AWS environments and beyond.

Catching Configuration Changes that Can Lead to Data Exposure

Amazon’s new security issue, which came to light just days before one of its biggest sale events of the year, is making recent headlines. And whilst it probably won’t stop the online retail giant from achieving a profitable Black Friday and Cyber Monday this year, it certainly will make many users stop and think.

SOAR Functional Components (Part 2)

Incident Management and Collaboration is another of Security Orchestration, Automation and Response platforms’ essential practice whereby security teams can manage security incidents, collaborate, and share information to deal with the incident efficiently and effectively. The best incident management and collaboration plan answer the following questions...

Rooted in Security Basics: The Four Pillars of Cyber Hygiene

The term “cyber hygiene” pops up frequently in articles, blogs and discussions about cybersecurity. But what does it really mean? Some say it is an ill-defined set of practices for individuals to follow (or ignore). Others say it is a measure of an organization’s overall commitment to security. Still others – and I am among them – think of “cyber hygiene” as simple, readily available technologies and practices for cybersecurity.

CyberInt - Argos Digital Risk Protection Platform

Recently recognized as one of the 20 most promising enterprise security solution providers for 2018 by CIOReview, CyberInt eliminates potential threats before they become crises by looking at all online activities and digital assets from an attacker’s perspective and provides managed detection and response services to customers worldwide. Leveraging Argos™ real-time digital risk protection platform with a global cyber expert analyst team, as well as managed SOC, threat hunting, deep dive investigations, real-time incident response and risk and business impact assessment services, CyberInt provides holistic end-to-end protection to digital businesses in retail, eCommerce, gaming and financial industries.