Follow AlienVault on their other social channels!
About Us
Company Size:
201-500 employees
Company Type:
AlienVault is simplifying the way organizations detect and respond to today’s ever evolving threat landscape. Our unique, award-winning approach combines the essential security controls of our all-in-one Unified Security Management platform with the power of AlienVault’s Open Threat Exchange, ...
Read more
Promoted Content
Beginner's Guide to Ransomware Detection and Prevention
Improve Security Visibility with OSSIM Correlation Directives
Register today!At the heart of SIEM is the ability to correlate events from one or many sources into actionable alarms based on your security policies. OSSIM includes the ability to create your own correlation rules, or use those developed by the community.Join us for this user training session covering how to:Write your own correlation directives based on events from one or more sourcesTurn correlation information into actionable alarmsUse correlations to enforce your security policiesRegister ...
How to Build a Security Operations Center (On a Budget)
Get your free copy today!Get All 5 Chapters of AlienVault’s How to Build a Security Operations Center (On a Budget) in 1 eBook! You'll get an in-depth look at how organizations with limited resources can set up a successful operations center for monitoring, detecting, containing, and remediating IT threats across applications, devices, systems, networks, and locations.The chapters you'll read focus on:The roles and responsibilities involved in a security operations teamThe key processes you'll ...
How to Stay Safe Online – Tips for Regular Folks
We’re celebrating National Cyber Security Awareness Month (NCSAM) with a weekly series of security articles on how to improve the state of cyber security-ness.Staying safe online has many similarities with staying safe on the line, aka tightrope walking. It involves a delicate mix of courage, foolhardiness, balance, poise, and the threat of falling to a horrible death. Read the blog on the AlienVault site.
How to Solve your Top IT Security Reporting Challenges with AlienVault
Register Now! If you needed to provide reports to management or an auditor to prove that your IT security controls are in place and working, how long would it take you to do that? And, how many different tools would you need to consult? The AlienVault Unified Security Management (USM) platform integrates many of the core security capabilities you need along with built-in reports to help you implement IT security best practice frameworks like the NIST Cybersecurity Framework ( ...
SIEM Analyst Research Bundle
Read The Reports!Security Information and Event Management (SIEM) is a critical security capability for threat detection and compliance. However, many organizations who start down the path of a SIEM deployment run into surprises in terms of the cost, resources and expertise required to effectively implement and maintain a SIEM deployment.This free SIEM Analyst Research Bundle compiles research reports from leading industry analysts - 451 Research, Frost & Sullivan, and SANS - to help yo ...
Machine Learning Myths
“Machine learning” is the new “it” buzzword in security. As a result, it’s being thrown around fairly loosely on vendor websites and in marketing materials. Not only is that unfortunate for anyone looking to get a straight answer on how machine learning can help their company stay more secure, it is also fostering a general sense of confusion around what the term actually means.To help clear things up, let’s take a closer look at six of the most common misconceptions around the use o ...
Explain Bitcoin to Me
Most Bitcoin articles get rushed up in the price movements of Bitcoin, and there's a place for that. This article, instead, will focus on the technical and InfoSec aspects of Bitcoin, and will aim to provide an understanding of the Bitcoin network and protocol.Bitcoin has been spoken of repeatedly in the news, nearly always on the topic of price movements and where it may go next. For more technical readers, the price movements aren't always the most important point. You may have fundamental que ...
Explain YARA Rules to Me
Introduction I like YARA. Every time I hear its name spoken aloud it makes me chuckle and think I should start gabbing in German. Even though its origins are somewhat more south and on a different continent, specifically South America for the curious. It never ceases to amaze me how many sharp people in our industry have not used it or, in some cases, not even heard of it. YARA is a tool aimed at (but not limited to) helping malware researchers identify and classify malware samples. It has been ...
SIEM 2.0 – How Unified Security Management SIEMplifies Threat Detection
Register NowSIEM solutions have been widely adopted to help IT teams collect and correlate data from a variety of security point products. However, traditional SIEM deployments require a great deal of time, money & expertise to properly normalize data feeds, create correlation rules to detect threats & continuously tune those rules to limit false positives. And, after all that work is done, it has to be continuously re-done as the network & threat landscape changes.AlienVault take ...
AlienVault OTX now supports YARA rules!
YARA rules are a great way of detecting, classifying and hunting for malware. We are happy to announce you can now develop, test and share YARA rules on AlienVault OTX. We're hard at work adding new features to make OTX even more valuable including new ways to personalize OTX, visualizations, and tools to help with malware analysis. If you have thoughts on what you would like to see added to OTX, tweet us @AlienVault or drop an email the blog on the ...

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?