Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AlienVault Delivers Phenomenal Cloud Security for AWS Customers

Viva Las Vegas! We aliens have landed at AWS re:Invent 2018 (Booth #1506), bringing phenomenal threat detection, response, and compliance to the AWS cloud. As I gear up for a full day of live product demos, I thought I’d take a moment to highlight some of the ways in which AlienVault is delivering phenomenal security to our customers’ AWS environments and beyond.

CyberInt - Argos Digital Risk Protection Platform

Recently recognized as one of the 20 most promising enterprise security solution providers for 2018 by CIOReview, CyberInt eliminates potential threats before they become crises by looking at all online activities and digital assets from an attacker’s perspective and provides managed detection and response services to customers worldwide. Leveraging Argos™ real-time digital risk protection platform with a global cyber expert analyst team, as well as managed SOC, threat hunting, deep dive investigations, real-time incident response and risk and business impact assessment services, CyberInt provides holistic end-to-end protection to digital businesses in retail, eCommerce, gaming and financial industries.

The Netacea Virtual Waiting Room

Netacea’s Virtual Waiting Room is a cloud-based service that sits in front of your website, mobile app and APIs, controlling the flow of visitors. Guarantee a positive customer omni-channel experience even under extreme conditions such as Black Friday. The use of online services has revolutionised the way we consume everything every day, which has made life great! What’s not so great though is when these services cannot meet the consumer demand that they generate, and then become unavailable.

Building and Evaluating a Threat Intelligence Program (Part 1)

In the previous post, we discussed the basics of Threat Intelligence and its types by throwing light on the concept of knowns and unknowns. In information security, any information which can aid the internal security team in the decision-making process and reduce the recovery time accordingly is considered as threat intelligence. This first part in this series of articles will discuss threat intelligence cycle and its importance.

Information Leakage of Threat Intelligence, Incident & Status Data

Information leakage of threat intelligence, incident data, and status data can have several legal consequences for organizations. Information leakage can occur due to the misconduct of disgruntled employees or results in by virtue of a nefarious cyber-attack. The underlying sections will take a deep dive into two different scenarios—namely, The Trauma of IP Address Leakage and The Menace of Product Vulnerability Leakage.

Introduction to Threat Intelligence and Types

The phrase Threat Intelligence has slowly gained significance in the information security community and their discussions. With the decision makers considering it as a high priority requirement, vendors have launched an array of products which are indeed confusing for an executive with the managerial background. This is an introductory post in our series of detailed discussion on threat intelligence.