Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

opsdemon

Latest posts

From GDPR to Meltdown: A Look Back at Memorable Infosec Events in 2018 (Part 1)

As 2018 draws to a close, it’s been a fascinating year in the IT security community. From record-breaking data breaches, new regulations and the Meltdown and Spectre debacle, we can certainly say it’s been eventful. To round the year off, we thought it would be interesting to ask some of our regular contributors (and followers on Twitter) what their standout moments were.

AlienVault Monthly Product Roundup October / November 2018

At AWS re:Invent recently, I spoke to several booth visitors who asked, “What’s new with AlienVault?” It was exciting to talk through some of the improvements we’ve made over the last year and see their eyes widen as the list went on. As our customers know, we regularly introduce new features to USM Anywhere and USM Central to help teams detect and respond to the latest threats.

How Do You Measure Your Investment in Security?

When evaluating enterprise security tools for their effectiveness, it can be challenging to find the right model for best calculating your Return on Security Investment (ROSI). Just a few years ago, the potential cost attributed to a security breach was likely to be primarily related in the assessed financial cost into a business’ reputation, with only a relatively small number of cases ever reaching significant legal or sustained loss of service-related costs.

5 Key Components Every Company Should Have in Their Privacy Policy

As a business owner, you’re no stranger to the myriad moving parts that keep the day-to-day business going. In all the bustle, it can be easy to overlook important tasks such as creating a privacy policy because you’re unsure where to start or which elements to include.

Weekly Cyber Security News 14/12/2018

A selection of this week’s more interesting vulnerability disclosures and cyber security news. As many of us ramp up to some kind of party frenzy over coming weeks, this timely article on how the youngsters and trendy ones are perhaps organising parties in a bad way could be worth absorbing. While it goes over my head (as according to my kids I’m a ‘miserable caveman’), hopefully it might help those of you more popular to get it right.

Security Orchestration Use Case: How to Automate VPN Checks?

An organization can have innumerable VPN access attempts from within or outside its facility. In the world of globalization and cloud computing, even these attempts can be made from outside the country. Checking each attempt manually is a daunting task for enterprises as it consumes a lot of time and engages more security professionals. The basic VPN checks involve DNS Leaks, IP Address Leaks (e.g., IPv4 and IPv6), and WebRTC Leaks.

The REAL 2019 Cyber Security Predictions

It’s December, which means it’s time to get those 2019 cyber predictions going. While there are many well-informed, and some not-so-well informed opinions out there, I’ve dug through the cyber underground, I’ve climbed data mountains, and delved to the depths of the dark web to seek out what is really happening.