Stop Attackers in Their Tracks with Threat Alerts in Spiceworks

AlienVault

"Securing your environment is a job that's never done. To help SpiceHeads on this front, Spiceworks now provides Threat Alerts, powered by AlienVault, that notify you if devices in your network have been communicating with known malicious hosts. This is usually a sign of malware infection, but not always. So, what should you do when you receive a Threat Alert in Spiceworks? Join AlienVault Green Guy Garrett Gross to learn key steps you should take to investigate Threat Alerts and determine what to do next.

In this session, Garrett will cover:

How to interpret the information provided by AlienVault Threat Alerts
How to determine which Threat Alerts require your attention
How to identify false positives that you can tune out"
Watch Now

Spotlight

Modern cybersecurity threats are changing the way organizations are implementing security. Older security techniques that relied on strong perimeter defenses to keep attacks away from vulnerable systems have been proven inadequate. As a result, IT Security Architects assume that an attack can penetrate the perimeter defenses and the system must “fight through” and attack remaining operational/secure. Without a secure perimeter, each component in the network must provide some level of defense itself to continue functioning properly until the attack can is detected and addressed.


OTHER ON-DEMAND WEBINARS

How to Use Crowd-Sourced Threat Intelligence to Stop Malware in its Tracks

Threat sharing networks have been around for a long time, however they have typically been "invitation-only", available to only large companies, or those within a particular industry. The AlienVault Open Threat Exchange is different. It is one of the first (and most diverse) threat sharing networks, open to any and all who wish to join. And, free services like new ThreatFinder help make the threat data in OTX available and actionable by all. Join AlienVault VP of Product Strategy, Russ Spitler, and Systems Engineer, Tom D'Aquino for a practical session covering how to use OTX to improve network security
Watch Now

The Rise of Advanced Malware and Evasive Network Attacks

Networking communication protocols make it possible for the internet to work. Unfortunately, criminals can use those trusted systems to obfuscate malicious data and penetrate your network defenses undetected. An advanced evasion technique (AET) is a method of delivering an exploit or malicious content into a vulnerable target so that the traffic looks normal and security devices will allow it to pass through. By combining attacks using several protocol layers, these advanced evasions bypass most existing security solutions undetected. Join us for a review of these attack techniques and a demonstration
Watch Now

Protecting the Exchange of Sensitive Customer Data with Your Vendors

BankInfoSecurity

For financial institutions, data security is both an operational and regulatory imperative. A bank or financial services provider that fails to protect a customer's financial data faces the threat of losing customers, tarnishing their reputation and eventually losing competitive advantage. There are some key questions you should think about when it comes to securing your customers' important financial data, including: How does regulatory compliance, like GLBA, affect the way your data needs to be handled & audited? Who has access to your sensitive files? What would the impact be if these files, including sensitive customer data, were compromised? Where and when is this data being sent.
Watch Now

ENTERPRISE MOBILE APPS THAT MATTER: APP TREND REPORT & BEST PRACTICES

Apperian

Watch this webinar to learn: What are the top apps that companies are deploying to their employees to increase productivity, streamline processes, and increase employee satisfaction Which industries are leading the way with mobile app deployments How to kick-start your mobile app strategy by identifying and creating apps that matter for your organization.
Watch Now

Spotlight

Modern cybersecurity threats are changing the way organizations are implementing security. Older security techniques that relied on strong perimeter defenses to keep attacks away from vulnerable systems have been proven inadequate. As a result, IT Security Architects assume that an attack can penetrate the perimeter defenses and the system must “fight through” and attack remaining operational/secure. Without a secure perimeter, each component in the network must provide some level of defense itself to continue functioning properly until the attack can is detected and addressed.

resources