Follow AlienVault on their other social channels!
About Us
Company Size:
201-500 employees
Company Type:
AlienVault is simplifying the way organizations detect and respond to today’s ever evolving threat landscape. Our unique, award-winning approach combines the essential security controls of our all-in-one Unified Security Management platform with the power of AlienVault’s Open Threat Exchange, ...
Read more
Promoted Content
GDPR Compliance Checklist: A 9-Step Guide
Chapter 4 – How to Build a SOC: Threat Intelligence
Read MoreThe Recipe for Threat Intelligence = Context + Attribution + ActionMonitoring your environment for nefarious traffic assumes that you know what those nefarious folks are doing, what “it” looks like, and how to find this activity across your critical infrastructure in the cloud and on-premises. The “bread crumbs” that these adversaries leave are usually of the same sort: IP addresses, host and domain names, email addresses, filenames, and file hashes.With this amount of inform ...
Building Blocks for Your 2018 IT Security Program
Register Now!Is one of your New Year's resolutions to improve IT security in 2018? If so, implementing effective asset discovery and vulnerability assessment are two of the most important first steps. Before you can protect your environment, you need to understand what assets you have across your cloud and on-premises environments, and be able to identify and prioritize vulnerabilities.Join this webcast and demo to see how the AlienVault Unified Security Management platform can help with these e ...
Chapter 3 – Security Operations Center (SOC) Tools
Read MoreSometimes security pros use the term “defense-in-depth” to describe how best to secure the critical data and systems that need to be protected against cyber threats.Think of this concept as a jawbreaker.The idea is pretty simple. Starting with the data you’re protecting at the center, you add layer upon layer of policy enforcement in order to make it difficult for an attacker to break through each layer to access that data.In fact, the cyber security industry grew out of this laye ...
Meltdown and Spectre – How to Detect the Vulnerabilities and Exploits
Register Now!As you've likely heard, Meltdown and Spectre are vulnerabilities that exist in Intel CPUs built since 1995. Hackers can exploit Meltdown and Spectre to get hold of information stored in the memory of other running programs. This might include passwords stored in a password manager or browser, photos, emails, instant messages and even business-critical documents.Join us for a technical webcast to learn more about these threats, and how the security controls in AlienVault Unified ...
GDPR Compliance Checklist: A 9-Step Guide
Read MoreThe GDPR, or General Data Privacy Regulation, will come into force in May of 2018 and requires organizations to maintain a plan to detect a data breach, regularly evaluate the effectiveness of security practices, and document evidence of compliance. If you don’t already have the required security tools and controls in place, your organization will need to start planning now to achieve compliance.This GDPR compliance checklist lays out 9 steps you can take now to best prepare for the n ...
Chapter 2 – Building a SOC: Processes and Procedures
Read MoreOne of the most valuable tools an airline pilot has at his disposal is the simplest one. A checklist. The checklist enumerates every single thing that must be done in order to maintain safety, avoid risk, and protect valuable lives. This ensures that you can get to your final destination without spilling any peanuts.The cyber security world isn’t all that different, yet the stakes are even higher.There is a long list of things that the SOC team needs to do—and do properly—so ...
I Am Dave
This cartoon has been making the rounds on the internet for a long time. It depicts how all security technologies and efforts can be undone by “Dave” the ‘stupid user’. I can’t think of many (well no) real industries that treat their users, peers, and customers with the same level of disdain.Imagine the automotive industry pushing a similar message. ‘On one hand we have seatbelts, ABS, airbags, five star safety features… and on the other hand we have dumb drivers.’Read ...
Chapter 1 – The SOC Team: Roles and Responsibilities
Read MoreJust like people, every security organization is different. In some companies, the executive team recognizes the importance of cybersecurity to the business bottom line. In these cases, the SOC team is in a great position, with enough budget for good tools, enough staff to manage them, and the “human” capital of executive visibility and support. Unfortunately, that’s not the reality in most cases.Most SOC teams are fighting fires with never enough staff, never ...
Agile Development, Agile Documentation
I remember when software documentation was linear and waterfall. No, really.Those were the days. Software was architected, designed, coded, the code was frozen… (I can totally hear you laughing from there. Shhhhh), and then it was documented. You’d buy disks, in boxes, with actual books included. Printed. On paper.…and then we had to spend our lunch breaks running from dinosaurs. Ah, the good old days.Read the whole blog on the AlienVault site!
5 Retail Security Tips: Don’t Let Hackers Ruin the Holiday Season
While many people will be kicking off their holiday shopping this weekend to take advantage of brick-and-mortar or online deals, unsavory hackers will be working on gaining access to consumers’ personal information through retailers for malicious purposes. Retailers are often targeted during these peak trading periods when it may be easier for criminals to hide their actions in the traffic. Hackers may use distributed denial of service (DDoS) attacks to flood retailer networks to render the ...

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play

Support Cybrary

Donate Here to Get This Month's Donor Badge



Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?