Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Tripwire Enterprise Demo: Improving your policy and compliance program

Tripwire Enterprise evaluates your systems to ensure compliance with security standards like PCI, NIST, CIS and ISO. It works with over 800 policy and platform combinations and allows you to create new policy content based on your organizational standards. Clear and understandable dashboarding provides visualization for compliance stakeholders. Watch this video for a demonstration of fast, accurate SCM in action with Tripwire Enterprise.

Tune your SIEM to be GDPR Compliant - 5 Steps to Take

The most hyped law on data protection has finally come into effect on May 25, 2018. Passed by the European Parliament on April 14, 2016, it is already being touted as the most stringent data protection law across the world. Prior to GDPR, Data Protection Directive of 1995 was applicable which now stands repealed. Apart from the businesses incorporated in the European Union, GDPR also applies to businesses incorporate outside the European Union but are dealing with the data of EU residents.

What Makes SOC Effective? People, Process, and Technology

In the evolving world of technology, cybersecurity threats are growing exponentially and, therefore, enterprises are seeking for standardized and automated Security Operation Centers (SOCs) to address these threats effectively. Though SOC standardization and Automation is of paramount importance, yet there are some other critical factors that must be considered when building an effective and reliable SOC.

AlienVault Monthly Product Roundup May 2018

We regularly introduce new features to USM Anywhere and USM Central to help your team to be more effective at detecting and responding to threats. You can keep up with our regular product releases by reading the release notes in the AlienVault Product Forum. Here are a few of the highlights from our May 2018 releases.

2 BitSight Alternatives for Managing Cyber Risk

If you’re involved in IT risk or security, you’ve probably encountered BitSight. It is one of a wave of promised solutions to a growing problem: how to manage the risks posed by your IT vendors in the cloud. The legacy approach to solving this problem is a combination of spreadsheet-based vendor assessments, sporadic penetration tests and vulnerability scans. If you combine this with subjective measurement and scoring of risk, you are probably taking on a lot more risk than you should.