Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

AlienVault Expands USM Anywhere to Include Endpoint Detection and Response Capabilities

SAN MATEO, Calif. – July 31, 2018 – AlienVault®, the leading provider of Unified Security Management® (USM) and crowdsourced threat intelligence, today announced the general availability of Endpoint Detection and Response (EDR) capabilities in USM Anywhere™. Visit AlienVault’s Black Hat booth #528 from August 7-9 to see a demonstration of endpoint security capabilities in USM Anywhere.

EventSentry v3.5 Released: Windows Process Monitoring to the Max, Registry Tracking, Tags & More

EventSentry v3.5 continues to increase visibility into networks with additional vantage points, making it easier for EventSentry users to reduce their attack surface as well as discover anomalies.

False Positive or the Real Deal?

An ominous flashing red light on a blacked-out computer screen means the promise of a threat. It was 21:26 on a Sunday night and an Intrusion Prevention System (IPS) alert shot across one of our screens. A security analyst usually has just minutes to respond, carry out an investigation on behalf of the organisation under threat and make a critical decision.

Autonomous cars: Data will drive the future

You might have not noticed it, but we are on the verge of a disruptive change in the way we humans transport ourselves. In the next five to ten years the way we think about – and take – our daily commute, our holiday vacation, trips to the market – anything that involves transport over a distance too great to walk – will dramatically change.

Questions You Should Ask Your Cloud-Based Log Management Service Provider

The log management service is often outsourced to a third-party service provider due to the complexity of the process involved in the collection of logs. When a business plans for outsourcing log management to a service provider, business requirements must be given a top-most priority. To start with, a business must identify the goals it desires to accomplish through log management. After locating the required resources, the decision-making body should select a vendor for availing its services.

Got Container Security? Make Sure to Secure Code and Supplemental Components

Organizations face numerous primary threats and security concerns when it comes to their container environments. Those issues extend into their build environment, an area which organizations need to protect because it’s usually the least secure aspect of their container infrastructure. They also extend into other areas, including inside the containers themselves.