They’re Watching You: How to Reduce Dwell Time in Your Environment

September 18, 2019 | Marcos Colón

Everyone likes to hear a good hero story, like a serial killer being ...

Cloaking Dirty Deeds: How to Inspect Encrypted Network Traffic

September 12, 2019 | Marcos Colón

In the constant battle between good and evil in the digital realm, security ...

How to Build the Ideal SOC

September 05, 2019 | Marcos Colón

With businesses evolving rapidly and leveraging new tools to enhance their ...

Effort vs. Knowledge: The Truth Behind Security Awareness Training

September 03, 2019

Assuming the data security learning curve of your average employee is lower ...

Analysis, Advice and Predictions from a Ransomware First Responder

August 27, 2019 | Marcos Colón

We’ve previously suggested that 2015 may have been the year “ransomware hit the ...

The What, Why, and How of AttackSurfaceMapper

August 20, 2019 | Marcos Colón

The primary goal for any security professional today is to present less of a ...

7 Questions to Ask Before Hiring A Security Partner

July 30, 2019 | Marcos Colón

As cyber threats continue to proliferate and pressure on in-house security ...

The 3 Biggest Database Threats and What Your Security Plan Should Look Like

April 08, 2019 | Dan Kaplan

Serving as the storekeeper of your most sensitive assets, from college ...

So, You’ve Been Breached: 9 Steps to Mitigate the Fallout

March 19, 2019 | Diane Garey

Discovering that you’ve been the victim of a breach is never pleasant. Perhaps ...

How to Make the Most of an Incident Response Retainer

February 15, 2019 | Diane Garey

With cyber threats continuously looming, there is a good chance you’ll have an ...

Malware Analysis Tools for Threat Hunting

February 07, 2019 | Charles Humphrey

If you're not into Wireshark, procmon and Windows Sysinternals you might be in ...

How Your Adversaries Increase Their Odds Thanks to the Growing Attack Surface

January 30, 2019 | Dan Kaplan

I recently listened to a podcast discussing the expanding legalization of ...

3 Reliable Methods to Safeguard Microsoft Office 365 Users and Data

December 11, 2018 | Thad Mann

In a previous article, I discussed the general security considerations you ...

What You Need to Know about NERC CIP Cybersecurity Standards

November 28, 2018 | Emma Currens

For more than a decade, energy and utility organizations have been tasked with ...

12 Clear-Cut Ways to Respond to Mandatory Breach Notification Rules in Canada

November 02, 2018 | Sangameswaran Manikkayam

This week brings mandatory breach notification to the Personal Information ...

Why Routers are the Neglected Endpoint and How to Protect Them

October 31, 2018 | Dan Kaplan

If you are like most people, the only time you think about your routers is when ...

9 Awesome Resources to Sharpen Your Security Skills

October 11, 2018 | Dan Kaplan

National Cyber Security Awareness Month spans October - even though we know all ...

A Complete Tutorial on Rolling Out Microsoft Office 365 Securely

September 28, 2018 | Thad Mann

Microsoft Office 365 (O365) is more than a service that provides employees with ...

The Supply Chain is Only as Strong as its Weakest Link: How You Can Better Defend Against Third-Party Cyberattacks

September 19, 2018 | Dan Kaplan

A particularly unfair aspect of a maturing cybersecurity program is that even ...

The Cliffs Notes Version to Addressing the Ransomware Threat at Schools

August 23, 2018 | Dan Kaplan

It's back to school time: for teachers, students…and cybercriminals.

Charlie Discovers Security Testing

February 27, 2018 | Dan Kaplan

You may remember our "Security Testing Practices and Priorities" report, which ...

Threat Detection & Response Made Easier for Growing Financial Services Company

February 22, 2018 | Leslie Johnson

For a San-Francisco based financial services firm that partners with technology ...

A 4-Step Process for Softening the Blow of a Zero-Day Vulnerability

October 25, 2017 | Dan Kaplan

Halloween is almost here, and if you want to bring out the fright in security ...

9 Pen Testing Essentials for Making ATMs Less Hackable

October 18, 2017 | Dan Kaplan

Criminals fancy ATMs for the same reason cybercriminals do: convenience. There ...

How to Eliminate Common Sources of Employee Fraud

October 11, 2017 | Guest Post

While you want to believe all your employees are loyal and trustworthy, many ...

Protecting Your Mobile Data: Advice from an Ethical Hacker

September 27, 2017 | David Jorm

Face it: Your employees love their mobile applications. The average person uses ...

9 Steps to Slowing and Stopping Your Next Data Breach

September 20, 2017 | Dan Kaplan

Data breaches are such an anxiety inducer because you never know when they're ...

Security Orchestration with the AlienApp for Palo Alto Networks Next-Generation Firewall

September 14, 2017 | Jeff Olen

At AlienVault, we’re passionate about simplifying the way organizations detect ...