Blog Posts Tagged with "AlienVault"

7fef78c47060974e0b8392e305f0daf0

Webinar: Keeping Your Open Source Software Secure

May 09, 2012 Added by:Infosec Island Admin

Understand why collaboration is invaluable in keeping proprietary systems secure. Learn how to share private information in public forums without harming your organization. Identify what tools are available to your organization for collaboration, notification, and knowledge-sharing...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Webinar: Keeping Your Open Source Secure

April 24, 2012 Added by:Infosec Island Admin

Understand why collaboration is invaluable in keeping proprietary systems secure. Learn how to share private information in public forums without harming your organization. Identify what tools are available to your organization for collaboration, notification, and knowledge-sharing...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Webinar: Reducing Visibility Costs with Unified Security Management

April 17, 2012 Added by:Infosec Island Admin

Webinar: Thursday, April 19, 2012 12:00 PM - 1:00 PM EST - Beyond improving your basic defenses, understand how unifying security management can maintain compliance and provide visibility into your infrastructure at a lower cost than traditional approaches...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Reducing the Cost of Visibility with Unified Security Management

April 09, 2012 Added by:Infosec Island Admin

Webinar: Thursday, April 19, 2012 12:00 PM - 1:00 PM EST - Beyond improving your basic defenses, understand how unifying security management can maintain compliance and provide visibility into your infrastructure at a lower cost than traditional approaches...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Evidence of Chinese Attacks on US Defense Contractors

January 30, 2012 Added by:Pierluigi Paganini

At least six Chinese IP addresses were used to proxy or host the command and control servers. The Netbox webserver is mainly used by those who speak Chinese. In fact, all the documentation to setup and learn the framework is only available in Mandarin...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Symantec: Chinese Connection to Attacks on Defense Contractors

January 27, 2012 Added by:Headlines

The data Symantec published reinforces evidence from an earlier investigation conducted by AlienVault, which described an orchestrated sprear-phishing campaign most likely targeting information on US drone technology which utilized malware-infected PDF documents to deliver the Sykipot payload...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Chinese Cyber Espionage Targeting Drone Technology

January 04, 2012 Added by:Headlines

"This campaign could target organizations related to technology used in... aerospace and military industries... With the information we collected it appears that this campaign has been running for months. Someone has said that cyberwar does not exist?. Draw your own conclusions..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Webinar: Cybersecurity for Electrical Cooperatives

September 21, 2011 Added by:Infosec Island Admin

Free Webinar: NESCO is charged by the DoE with providing information on collaboration, tactical awareness, rapid notification, forensics and applied research. Steve Parker, NESCO Lead, will be hosting the session along with AlienVault's Chris Blask and Trusted Metrics' Michael Menefee...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Cybersecurity for Electrical Cooperatives - A Webinar

September 12, 2011 Added by:Infosec Island Admin

Free Webinar: NESCO is charged by the DoE with providing information on collaboration, tactical awareness, rapid notification, forensics and applied research. Steve Parker, NESCO Lead, will be hosting the session along with AlienVault's Chris Blask and Trusted Metrics' Michael Menefee...

Comments  (0)

A966b1b38ca147f3e9a60890030926c9

Paper Frames Debate on Big Brother in Critical Infrastructure

September 08, 2011 Added by:Chris Blask

The three scenarios exercise the legal issues of government access to information of increasing depth. The first two speak to capabilities that should be further developed -honeynets and continuous monitoring - while the third scenario in part touches on workforce development...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Webinar: Cybersecurity for Electrical Cooperatives

August 22, 2011 Added by:Infosec Island Admin

Free Webinar: NESCO is charged by the DoE with providing information on collaboration, tactical awareness, rapid notification, forensics and applied research. Steve Parker, NESCO Lead, will be hosting the session along with AlienVault's Chris Blask and Trusted Metrics' Michael Menefee...

Comments  (0)

A966b1b38ca147f3e9a60890030926c9

Webinar: Industrial Control Systems SIEM

July 13, 2011 Added by:Chris Blask

Physical security and industrial process data is correlated with real time situational awareness of cyber assets to produce constant visibility. Join this free webinar to explore the efficiency and ease of use of AlienVault ICS SIEM...

Comments  (2)

A966b1b38ca147f3e9a60890030926c9

Network Security: The Threats You Don’t See

June 22, 2011 Added by:Chris Blask

Threats to critical infrastructure are usually discussed in the terms of Cyber Warfare. Unlike a nation-state, however, there is no reason to believe that a sufficiently motivated individual or small group would not release malware which attacks everything it sees...

Comments  (0)

A966b1b38ca147f3e9a60890030926c9

Flying Blind in Critical Infrastructure

June 07, 2011 Added by:Chris Blask

Once you get your head around the idea that you cannot trust your cyber devices you find it fits with existing industrial ideology quite well. The answer is to do your best to build a reliable cyber system - just as you do with the physical assets - then monitor it like a convicted criminal...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

AlienVault Releases SCADA SIEM for Critical Infrastructure

May 31, 2011 Added by:Headlines

"We have a solution that can address the security and compliance needs of customers in process control industries including electric power utilities, public works and oil & gas. You just cannot get that level of capability, reliability and integration with legacy IT or ICS solutions..."

Comments  (0)