Blog & Resources

The Risks of Data Tampering and How to Prevent It

Most businesses are aware of the risks associated with data theft or exposure. The recent Equifax breach, which compromised the sensitive information of nearly half the U.S. population, is only the most recent in a series of cybercrimes in which massive amounts of data were exfiltrated.

How Encryption Protects Sensitive Data

Many people learned about encryption due to the rise of ransomware attacks. Hackers use encryption to effectively “scramble” a user’s files so that they cannot be read without the correct encryption key. The hackers then demand a payment, usually in Bitcoin, in exchange for the key needed to unlock the files.

Improve Cybersecurity with Intelligence and a Better Sandbox

In our last post, we talked about the rise of file-less malware that leaves little evidence of a cyberattack. It’s difficult enough to defend against known security threats, and virtually impossible to prevent these sneak attacks. That’s why organizations need an incident response plan for detecting security events and taking steps to minimize the damage.

Getting a Clue About Sneaky New Malware

“Clueless.” That’s the name of a 1995 teen comedy that became a surprise box-office hit and a cultural touchstone for an entire generation of Americans. It’s also a pretty good description of an insidious new malware threat that possesses none of the customary indicators of a network intrusion.

How AlienVault USM Improves upon Traditional SIEM

In the previous post, we discussed the recent uptick in adoption of security information and event management (SIEM) solutions, and why SIEM will continue to be a primary focus of IT investments for the next few years. SIEM provides visibility into all sources of security data across the network and integrates this data in a single solution.

Just released our free eBook, 20 Signs That Your Business is Ready for Managed ServicesDownload
+