Adapting to security’s new reality

Adapting to security’s new reality

The cloud has made its way into everyday vocabulary; even non-tech startups and consumers have an awareness of cloud computing and its impact. As it’s shifted the technology landscape, it’s also impacted the security landscape – not...

Information security misconceptions

Information security misconceptions

Channeling my inner Billy Bragg, isn't it fair to say that nobody knows nothing anymore?

If time is money, what exactly is data?

If time is money, what exactly is data?

If you consider how much your data is worth to various parties and in varied contexts, then you’ll be in a better position to understand both its value and the extent to which it needs to be protected.

It’s not your parents’ SIEM

It’s not your parents’ SIEM

The SIEM (Security Information and Event Management) isn't dead: it just doesn't look like it used to and has evolved into a modern threat monitoring and detection solution.

Be afraid of the dark web – or learn to monitor it

Be afraid of the dark web – or learn to monitor it

How closely the dark web needs to be monitored depends on each organization’s own capabilities and appetite for risk.

If data is the new oil, then Equifax just caused a huge environmental disaster

If data is the new oil, then Equifax just caused a huge environmental disaster

Examining the Equifax breach, its long-lasting impact and the need for more – and better – regulation.

Putting the cyber in crime

Putting the cyber in crime

Javvad Malik, security advocate at AlienVault, explains how lower barriers and increased profits have lead to a surge in cybercrime.

Nothing new to (Wanna)Cry about

Nothing new to (Wanna)Cry about

Javvad Malik of AlienVault examines how the recent ransomware strain WannaCry is similar to past attacks, and why changes to regulations and business models are impacting the future of cybersecurity.

Is your company spending on the right security technologies?

Is your company spending on the right security technologies?

Here are three considerations that can help companies make the right decisions when it comes to investing in security technology.

Well-funded doesn't mean well-secured

Well-funded doesn't mean well-secured

Being able to buy security products doesn't mean your business is secure. You need an integrated, security technology strategy.

3 tips to improve threat detection and incident response

3 tips to improve threat detection and incident response

These three security controls are surefire ways to improve threat detection and incident response to hacks and data breaches.

Five ways cybersecurity is nothing like the way Hollywood portrays it

Five ways cybersecurity is nothing like the way Hollywood portrays it

Javvad Malik, AlienVault, takes a look at five of the most common cybersecurity misperceptions as portrayed in TV shows and movies.

8 security tips for retailers and consumers this holiday season

8 security tips for retailers and consumers this holiday season

Here are eight tips for retailers and consumers to keep top of mind this holiday season to prevent them from becoming a victim of holiday scams.

Top Blog Posts