Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Threat Detection

Information Leakage of Threat Intelligence, Incident & Status Data

Information leakage of threat intelligence, incident data, and status data can have several legal consequences for organizations. Information leakage can occur due to the misconduct of disgruntled employees or results in by virtue of a nefarious cyber-attack. The underlying sections will take a deep dive into two different scenarios—namely, The Trauma of IP Address Leakage and The Menace of Product Vulnerability Leakage.

Introduction to Threat Intelligence and Types

The phrase Threat Intelligence has slowly gained significance in the information security community and their discussions. With the decision makers considering it as a high priority requirement, vendors have launched an array of products which are indeed confusing for an executive with the managerial background. This is an introductory post in our series of detailed discussion on threat intelligence.

Threat Detection with AlienVault® USM: 2-Minute Overview

AlienVault USM simplifies threat detection and analysis. Our unified platform includes pre-integrated tools combined with up-to-the-minute threat intelligence and delivers an easy, effective way to accelerate your threat detection and response. Additionally, our Kill Chain Taxonomy allows you to focus your attention on the most important threats, with attacks classified into five categories and contextual information to help you understand attack intent and threat severity quickly.

Customisable Queuing Pages | Virtual Waiting Room

Netacea Virtual Waiting Room ensures website availability for customer transactions by placing visitors the system cannot cope with into a queue and serving them customisable content. Inform your customers with a branded queuing screen detailing their place in the queue and the estimated waiting time. Encourage customers to spend more by displaying special offers and discount codes.

Threat Actors in Critical Infrastructure: New Trends and Risk Factors

In this on-demand webcast, guest presenter Mike Chaney, who supports the DHS, National Cybersecurity & Communications Integration Center (NCCIC), and David Meltzer, Tripwire CTO, will share best practices to reduce the likelihood and severity of incidents that may significantly compromise the security and resilience of the critical infrastructure.

Improving Threat Detection through Managed Security Service Providers (MSSPs)

Cybersecurity is a growing concern as breaches continue to increase in frequency and make headline news. Unfortunately, due to time and other constraints, many smaller businesses postpone the complicated task of risk management, only to eventually succumb to the devastating ramifications of a cyberattack. While the security solutions themselves appear complicated, the ability to mitigate risk is within reach of all.

AlienVault Expands USM Anywhere to Include Endpoint Detection and Response Capabilities

SAN MATEO, Calif. – July 31, 2018 – AlienVault®, the leading provider of Unified Security Management® (USM) and crowdsourced threat intelligence, today announced the general availability of Endpoint Detection and Response (EDR) capabilities in USM Anywhere™. Visit AlienVault’s Black Hat booth #528 from August 7-9 to see a demonstration of endpoint security capabilities in USM Anywhere.