AlienVault
Follow
2989 Followers
Follow AlienVault on their other social channels!
About Us
Founded:
2007
Company Size:
201-500 employees
Company Type:
Private
AlienVault is simplifying the way organizations detect and respond to today’s ever evolving threat landscape. Our unique, award-winning approach combines the essential security controls of our all-in-one Unified Security Management platform with the power of AlienVault’s Open Threat Exchange, ...
Read more
Promoted Content
Beginner's Guide to Ransomware Detection and Prevention
Follow
16
Security Tips for Parents with Kids Going Back to School
Using mobile devices, PCs, and the internet is something your children have likely been doing from a young age. It's good for them to acquire computer literacy early, and it even may help your children with their schoolwork. But as a parent, you need to be aware of the security risks your children face online, and take appropriate steps to manage these carefully – both by teaching your children what to do and what to avoid, and by monitoring their online activities.Read more on the AlienVault ...
Follow
21
How to Configure Your AlienVault OSSIM Installation: Advanced Topics
Register Now!Because every network environment is different, OSSIM offers flexible configuration options to adapt to the needs of different environments. Whether you are just getting started with OSSIM, or have been using it for years, thinking through the OSSIM configuration options available will help you get the most out of your installation.After a short refresher on basic configuration tips (HIDS deployment, configuring syslog & plugins, vulnerability scans, connecting to Open Threat Ex ...
Follow
470
How the Vote Hacking Was Done at DefCon25
The vote hacking village at DefCon25 was an eye-opening experience in the world of what-ifs, worst-case scenarios, and the results of utter carelessness.As the village opened on Friday, I sat down at a Diebold ExpressPoll 5000, along with another teammate. For the next five hours we worked together to figure out how to compromise the device, but the first step was making the thing work.Read about our discoveries in the AlienVault blog - http://ow.ly/LxD030ejGTn
Follow
273
How Smart Security Teams Use Cyber Threat Intelligence
Register Now! As malware and ransomware become more commercialized, and the evolution of threats accelerates, it’s hard for organizations to keep up – even when they have multiple security products deployed. The latest SANS Cyber Threat Intelligence Survey showed that organizations using threat intelligence can gain dramatic improvements in visibility into threats, to enable a faster and more accurate response.Join AlienVault for this practical session to learn how smart security teams ...
Follow
360
Security Monitoring Best Practices for Azure
Learn essential cloud security practices that you can put into place today to ensure that your data, workloads, and systems are secure in your Azure environment.In this free white paper, you’ll learn:How challenges manifest in the cloudWhat the Shared Responsibility Model means for your IT teamHow to ensure all your systems are monitored and secure in your Azure environmentDownload this white paper now to learn how you can start using AlienVault USM to secure your Microsoft Azure environment t ...
Follow
93
Data Carving in Incident Response – Steps Toward Learning More Advanced DFIR Topics
New guest blog by Joe Gray. Excerpt: I have been in information security since March 2010, when I got out of the Navy after navigating nuclear submarines for almost 7 years. Little did I know that with this change of career, I was about to be in for the ride of my life.I have been steadily progressing as a "blue teamer" or enterprise defender this whole time and have undertaken learning one of (what I believe to be) the most difficult blue team trades: reverse engineering malware. The purpose of ...
Follow
1741
Open Source Network Security Tools for Beginners
Download Now. With so many open source tools available to help with network security, it can be tricky to figure out where to start, especially if you are an IT generalist who has been tasked with security.In this white paper, we'll provide an overview of some of our favorite open source tools as well as tips on how to use them for network security.You'll learn about using open source tools for:Network discoveryNetwork IDSVulnerability scanningPenetration testingDownload your copy today and l ...
Follow
816
How Hackers Manipulate Email to Defraud You
Internet fraud is one of the most common motivators of cybercrime. Millions of dollars are stolen every year from victims who are tricked into initiating wire transfer payments through social engineering tactics and computer breaches. This is typically accomplished using one of three methods: business email compromise (BEC), email account compromise (EAC), and spoofing.All three of these methods can be attempted against any organization that relies on email for communication. Being a smaller com ...
Follow
351
The Shadow Brokers: What’s Next After WannaCry
Register NowThe Shadow Brokers are a hacking group who have published several leaks containing hacking tools from the National Security Agency (NSA), resulting in high profile malware attacks like the recent WannaCry ransomware attacks. So, what can we expect next as a result of the leaked hacking tools? The AlienVault Labs security research team has been analyzing the leaked information in an effort to understand potential attack vectors, and create the necessary threat intelligence update ...
Follow
88
The Cybersecurity of Persona 5
I'm not only an information security professional, I also happen to be a huge Japanese RPG fan. I've also been playing video games since 1989. The Persona spinoff of the massive Megami Tensei series is one of my favorite game franchises. Persona games feature beautiful art design by Shigenori Soejima and Masayoshi Suto, excellent music by Shoji Meguro, well written stories and characters, and compelling game mechanics.I only write professionally about cybersecurity, I'm not a video game reviewer ...

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar
Cybrary works best if you switch to our Android-friendly app
Continue

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel