Incident readiness is crucial for state and local governments

March 11, 2024 | Christina Richmond

What is an incident response plan (IRP) and how effective is your incident response posture?

July 07, 2023 | Marcaé Bryant

As everyone looks about, sirens begin to sound, creating a sense of urgency; ...

What is the difference between incident response & threat hunting?

July 05, 2023 | Mark Stone

The content of this post is solely the responsibility of the author. LevelBlue ...

Improving your bottom line with cybersecurity top of mind

April 25, 2023 | Bindu Sundaresan

In times of economic downturn, companies may become reactive in their approach ...

Back to the office…

July 12, 2021 | James Prince

As the world is starting to move out of lockdown, businesses are moving some of ...

Stories from the SOC - Office 365 account compromise and credential abuse

June 23, 2021 | Marcus Hogan

Stories from the SOC is a blog series that describes recent real-world security ...

Automated Incident Response Explained

March 17, 2020 | Julia Kisielius

Everything you need to know about automated incident response Picture this: ...

Post-incident review and the big data problem

July 29, 2019 | Allie Mellen

Across the board, security teams of every industry, organization size, and ...

Incident Response Methodology: The OODA Loop Explained

January 24, 2019 | James Fritz

An incident response methodology can be explained as a collection of procedures ...

Culture Eats Security for Lunch

October 09, 2017 | Javvad Malik

In celebration of Week 2 of National Cyber Security Awareness Month (NCSAM) – ...

Incident Response Automation Challenges (and How USM Anywhere Can Help)

July 10, 2017 | Julia Kisielius

According to the SANS 2017 Incident Response Capabilities Survey, 47% of ...

Incident Response Orchestration: What Is It and How Can It Help?

May 30, 2017 | Julia Kisielius

The other day, I invited about twelve friends to my apartment for dinner—on a ...

Beginner’s Guide to Open Source Incident Response Tools and Resources

February 21, 2017 | James Fritz

**OSSIM is no longer in use as we focus on delivering enhanced solutions for ...

Training for the Breach

February 06, 2017 | John McLeod

Investigating breaches can be a bit overwhelming and very intimidating for ...

Recent Attacks Demonstrate The Urgent Need For C-Suite Cybersecurity Expertise

December 12, 2016 | Chuck Brooks

Escalating cyber-attacks on corporations, infrastructure, and organizations ...

Changing Business, and Risks of the Supply Chain

September 08, 2016 | Javvad Malik

Business models have greatly evolved and changed over the years. Global, ...

Incident Response Checklists

August 10, 2016 | Denny LeCompte

Incident response checklists are an essential part of responding to security ...

2016 SANS Survey on Incident Response

June 19, 2016 | Kate Brew

AlienVault helped fund the 2016 SANS Incident Response Survey. We find that ...