AlienVault Blogs - RSS Feed

The most recent posts from across the AlienVault blogs.

Latest articles

Defending the client-side attack surface

It is strange to think that not that long ago the Internet was a very different place.  A place filled with static text content, marked up in HTML, and served up alongside a few included image files; mostly consumed by a small population of persons with specific interests. Today’s Internet consumer demands a vibrant and responsive user experience customized...

Password security tips and best practices for enterprises

In honor of World Password Day, we’re doing our part to help keep your business secure by discussing the good, the bad, the ugly and the critical about passwords. Let’s face it: between all the logins we need for work and all the accounts we use in our personal lives, there are too many passwords to remember. So many of us do what seems natural—use...

5 IT security strategies that you should think about as employees return to the office

This blog was written by an independent guest blogger. Without a doubt, digital transformation accelerated amid the pandemic and made it possible for employees to work remotely. However, it also intensified the threat landscape created by malicious attackers who jumped on the first opportunity to attack the more vulnerable home networks. As remote...

New Advanced AlienApps for Fortinet

Here at AT&T Cybersecurity, we feel strongly that security should fit into your business, not the other way around.  We lower the friction security brings to day-to-day operations through automating the essential security operations such as detection and response.  By integrating different security products together to form a consolidated security...

The new normal is actually very normal:  Punctuated equilibrium, security cycle theory, and the “New Normal”

In 2020, the world was hit with an unexpected pandemic that changed much of life as many had come to know it.  Virtually overnight, masks were required, employees were working remotely, children were home from school, and businesses were locked down to stop the spread of Covid19.  In reading the news and social media the term “The New Normal” has taken...

The importance of creating a small business Cybersecurity plan

This blog was written by an independent guest blogger. It’s estimated that cyber crime will cost businesses as much as $45,000,000,000 by 2025. Each year, small businesses who haven’t put a cyber security plan in place are at the mercy of hackers who are using ever increasingly sophisticated methods to breach their network, compromise their data...

What Docker runtime deprecation means for your Kubernetes

This blog was written by an independent guest blogger. On December 8, 2020, Kubernetes released version 1.20—the third and final release of the popular container orchestration platform in 2020. Kubernetes noted in a blog post that the version contained 42 enhancements. Of those enhancements, 16 entered into alpha, while the remainder moved to beta...

Priority on people - An argument against the excessive use of Cybersecurity technology

Introduction Despite what many advertisements and salespeople would like you to think, you don’t need to (and in many cases shouldn’t) spend a fortune on security tools to achieve a robust cybersecurity program. Some tools are essential, such as a ticketing tool or Security Information and Event Management (SIEM) system, but the best security programs...

The 5 most crucial Cybersecurity updates for businesses in 2021

This blog was written by an independent guest blogger. For as long as businesses have used computers, cybersecurity has been crucial. Now, as modern business and data are becoming inseparable, it’s an absolute necessity. As companies start to recover from 2020 losses, they should consider investing in security updates. Cybercrime reached new heights...

Lessons learned from building an inventory of systems

IT asset inventory vs an ISI – What’s the difference?  Many frameworks, standards, and regulations require organizations to have an IT Asset Management program in place. However, the understanding of what separates a mature Information System Inventory (ISI) from an IT Asset Inventory and the benefits realized from an ISI are generally less well...

Discover, share and read the best on the web

Subscribe to RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters! Get unfiltered news feeds or filter them to your liking.

Get Inoreader
Inoreader - Subscribe to RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters!