Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

Security Orchestration, Automation and Response (SOAR) - The Pinnacle For Cognitive Cybersecurity

The cognitive tools/technologies of machine learning (ML) and artificial intelligence (AI) are impacting the cybersecurity ecosystem in a variety of ways. Applied AI machine learning and natural language processing are being used in cybersecurity by both the private and public sectors to bolster situational awareness and enhance protection from cyber threats. The algorithmic enablers that make ML and AI pinnacles of cybersecurity are automation and orchestration.

SFTP: The Future of Large Data Transfers

In a world where sharing files is as easy as clicking a link, it’s hard to imagine using older services like FTP. Believe it or not, FTP and its derivatives, FTPS, FTPES and SFTP, are still widely preferred for processes like bulk file/folder transfers. To understand why FTP and SFTP are still relevant, it’s important to first know what makes each subsidiary unique. So, let’s explore the differences between them.

AlienVault Delivers Phenomenal Cloud Security for AWS Customers

Viva Las Vegas! We aliens have landed at AWS re:Invent 2018 (Booth #1506), bringing phenomenal threat detection, response, and compliance to the AWS cloud. As I gear up for a full day of live product demos, I thought I’d take a moment to highlight some of the ways in which AlienVault is delivering phenomenal security to our customers’ AWS environments and beyond.

Catching Configuration Changes that Can Lead to Data Exposure

Amazon’s new security issue, which came to light just days before one of its biggest sale events of the year, is making recent headlines. And whilst it probably won’t stop the online retail giant from achieving a profitable Black Friday and Cyber Monday this year, it certainly will make many users stop and think.

SOAR Functional Components (Part 2)

Incident Management and Collaboration is another of Security Orchestration, Automation and Response platforms’ essential practice whereby security teams can manage security incidents, collaborate, and share information to deal with the incident efficiently and effectively. The best incident management and collaboration plan answer the following questions...

Rooted in Security Basics: The Four Pillars of Cyber Hygiene

The term “cyber hygiene” pops up frequently in articles, blogs and discussions about cybersecurity. But what does it really mean? Some say it is an ill-defined set of practices for individuals to follow (or ignore). Others say it is a measure of an organization’s overall commitment to security. Still others – and I am among them – think of “cyber hygiene” as simple, readily available technologies and practices for cybersecurity.

How SOAR helps a Security Operations Centre?

In the previous post, we discussed the basics of SOAR – Security Orchestration, Automation, and Response and how it is becoming a must-have for businesses across the globe. In this post, we will continue our discussion with how an SOAR solution can help an SOC in improvising its operations. Our experts have identified the following ways in which an SOAR solution proves to be beneficial for a business...

5 Digital Threats to Watch Out for on Black Friday

The end of November is a busy time in the United States. On Thanksgiving, friends and family gather together to give thanks for good food, good company and good fortune. Once they’ve put away the leftovers, many Americans don their coats, head to the malls and wait in line all night. For what? Black Friday, the commencement of the Christmas shopping season.