A SOC Toolbelt: Best Practices for Security Operations

August 07, 2025 | Nikki Stanziale

LevelBlue Threat Detection and Response for Government is FedRAMP Certified

July 07, 2021 | Rupesh Chokshi

Photo by Katie Moum on Unsplash

5 defensive COVID-19 actions IT managers can take now

May 04, 2020 | Roger Thornton

As if there wasn’t enough to worry about these days, cyber attacks have taken a ...

OTX is a Free STIX/TAXII Feed

November 21, 2019 | Chris Doman

Introduction The Open Threat Exchange (OTX) team has been hard at work and we ...

Announcing the AlienVault Success Center!

March 07, 2019 | Kenneth Coe

**OSSIM is no longer in use as we focus on delivering enhanced solutions for ...

AlienVault Monthly Product Roundup April 2018

May 01, 2018 | Danielle Russell

We are continuously making improvements and rolling out new features to USM ...

New! Free Threat Hunting Service from AlienVault – OTX Endpoint Security

April 17, 2018 | Danielle Russell

70% of successful security breaches start on endpoint devices, according to ...

OTX Trends Part 3 - Threat Actors

January 30, 2018 | Chris Doman

By Javvad Malik and Chris Doman

OTX Trends Part 2: Malware

January 23, 2018 | Chris Doman

By Javvad Malik and Christopher Doman

OTX Trends Part 1- Exploits

January 16, 2018 | Chris Doman

By Javvad Malik and Christopher Doman

2017 NopSec State of Vulnerability Risk Management Report

November 27, 2017 | Michelangelo Sidagni

With the turning of the leaves and the first cold fall nights, usually at ...

2017 NopSec State of Vulnerability Risk Management Report

November 27, 2017 | Michelangelo Sidagni

With the turning of the leaves and the first cold fall nights, usually at ...

5 Retail Security Tips: Don’t Let Hackers Ruin the Holiday Season

November 24, 2017 | Javvad Malik

While many people will be kicking off their holiday shopping this weekend to ...

Powering the Cisco Threat Intelligence Director with AlienVault OTX Threat Data

November 15, 2017 | John Maguire

We built the AlienVault® Open Threat Exchange® (OTX™) to disrupt the ...

YARA Support and Other Recent Additions to OTX

August 21, 2017 | Chris Doman

AlienVault OTX now supports YARA rules! YARA rules are a great way of ...

The Upgraded AlienVault OTX API & Ways to Score Swag!

August 17, 2017 | Chris Doman

We've made a number of improvements to the depth of data in OTX recently, which ...

Revealing the Power of Cyber Threat Intelligence

July 26, 2017 | Irfan Shakeel

In today’s cyber world, decision makers continuously question the value of ...

The Power of Community: My Real-Life Lesson in Community-Sourced Threat Intelligence

May 15, 2017 | Danielle Russell

Last week, my husband received the dreaded call from our bank.

GhostAdmin: The Invisible Data Thief - Notes from the Underground

February 27, 2017 | Julia Kisielius

Data theft is a major threat to businesses in today’s economy. With large ...

Beginner’s Guide to Open Source Incident Response Tools and Resources

February 21, 2017 | James Fritz

**OSSIM is no longer in use as we focus on delivering enhanced solutions for ...

The Evolution of Threat Intelligence

January 26, 2017 | Chris Doman

Hi! My name is Chris Doman and I‘ve just joined AlienVault to work on the Open ...

Threat Intelligence Feed is for Horses

October 13, 2016 | Russ Spitler

Threat Intelligence Feed. There, I said it. I have not said that phrase in 5 ...

5 Key Questions on Threat Detection Answered by Roger Thornton, AlienVault CTO

September 07, 2016 | Kate Brew

What Makes AlienVault Different? Roger Thornton talks about AlienVault's roots ...

New Threat Detection Platforms for the Midsized Enterprise

August 31, 2016 | Jake Mosher

The threat landscape gets more difficult to navigate every day. Organizations ...

Daserf – A Backdoor to Espionage

August 24, 2016 | Patrick Bedwell

Background Daserf is an example of a backdoor, malware that provides attackers ...

2016 SANS Cyber Threat Intelligence Survey: OTX Highlighted

August 17, 2016 | Kate Brew

AlienVault helped sponsor this year's SANS survey and report on Cyber Threat ...

Intelligent Cyber Defense using Threat Analysis

August 16, 2016 | Irfan Shakeel

Traditional cyber security strategy focuses on blocking known cyber threats and ...

OnionDog – An Example of a Regional, Targeted Attack

August 09, 2016 | Patrick Bedwell

Background Bad actors are getting more sophisticated with the techniques they ...