AlienVault announces new training: Incident Response for USM Appliance Analysts

By Michelle Drolet . 31 Mar 2017

AlienVault recently announced a new addition to the AlienVault training portfolio: Incident Response for USM Appliance Analysts, a two-day course that we will start delivering Live and Online in May. AlienVault has had *many* requests from customers and MSSPs for training focused on the analysis of threats identified by the USM Appliance. This course provides … Continue reading AlienVault announces new training: Incident Response for USM Appliance Analysts

Botnets: Is your network really protected?

By Michelle Drolet . 27 Mar 2017

Security is taking a backseat as more and more devices connect to the internet The tech world moves at a tremendous pace, unleashing wave after wave of innovation intended to improve our everyday lives. Many new devices, from security cameras to fridges, or TVs to baby monitors, are now internet connected. This affords us remote … Continue reading Botnets: Is your network really protected?

Congratulations to our Partner Snoopwall for Being Named One of the 50 Fastest Growing Tech Companies for 2016

By Michelle Drolet . 16 Dec 2016

The Silicon Review has declared SnoopWall is One of the 50 Fastest Growing Tech Companies for 2016.   SnoopWall, Inc. delivers breach prevention technology that helps small to medium size enterprises (SMEs) get one step ahead of the next cyber-criminal, malicious insider, phishing attacks, ransomware or zero-day malware behind the corporate firewall. Customer adoption and … Continue reading Congratulations to our Partner Snoopwall for Being Named One of the 50 Fastest Growing Tech Companies for 2016

7 Steps to Proactive Security

By Michelle Drolet . 4 Nov 2016

The key to securing against this threat lies in a common metaphor—if a ship has a hole, it is better to patch the breach than bail the water   Data breaches are increasingly becoming an expensive problem for more and more companies. According to the most recent Ponemon Institute Data Breach report, insecure data cost … Continue reading 7 Steps to Proactive Security

Always be Prepared: Monitor, Analyze and Test your Security

By Michelle Drolet . 11 Oct 2016

Stay vigilant, plan your response and test your defenses with CIS Controls 18, 19 and 20   This is the final entry in our series on the 20 Critical Security Controls devised by the Center for Internet Security (CIS) as best practices to help the public and private sectors tighten their cybersecurity. We started down … Continue reading Always be Prepared: Monitor, Analyze and Test your Security

Information Security Summit 2016 Review: Ransomware, Application Vulnerability, Hacking as an Industry Lead our Discussion

By Michelle Drolet . 23 Jun 2016

Thanks to all who attended and sponsored our 2016 Information Security Summit. It was a great turnout where we discussed a number of issues and threats facing infosec today. We were happy to see attendees share ideas and continue the discussion online with #summitbuzz16 Here are some of the topics discussed at this year’s summit: … Continue reading Information Security Summit 2016 Review: Ransomware, Application Vulnerability, Hacking as an Industry Lead our Discussion

How to keep cybercriminals out of your apps

By Michelle Drolet . 27 Feb 2015

Four ways to implement and maintain security testing.   Cybercriminals had a fantastic time in 2014 – breaching major retailers such as Home Depot and Kmart, major financial institutions (notably JPMorgan Chase), and a slew of smaller companies. Indeed, cybercrimes are growing more common, more costly, and taking longer to resolve. Those are among the key … Continue reading How to keep cybercriminals out of your apps

Tags