A SOC Toolbelt: Best Practices for Security Operations
August 07, 2025 | Nikki Stanziale
Stay Informed
Sign up to receive the latest security news and trends straight to your inbox from LevelBlue.
LevelBlue Threat Detection and Response for Government is FedRAMP Certified
July 07, 2021 | Rupesh Chokshi
Photo by Katie Moum on Unsplash
5 defensive COVID-19 actions IT managers can take now
May 04, 2020 | Roger Thornton
As if there wasn’t enough to worry about these days, cyber attacks have taken a ...
OTX is a Free STIX/TAXII Feed
November 21, 2019 | Chris Doman
Introduction The Open Threat Exchange (OTX) team has been hard at work and we ...
Announcing the AlienVault Success Center!
March 07, 2019 | Kenneth Coe
**OSSIM is no longer in use as we focus on delivering enhanced solutions for ...
AlienVault Monthly Product Roundup April 2018
May 01, 2018 | Danielle Russell
We are continuously making improvements and rolling out new features to USM ...
New! Free Threat Hunting Service from AlienVault – OTX Endpoint Security
April 17, 2018 | Danielle Russell
70% of successful security breaches start on endpoint devices, according to ...
OTX Trends Part 3 - Threat Actors
January 30, 2018 | Chris Doman
By Javvad Malik and Chris Doman
OTX Trends Part 2: Malware
January 23, 2018 | Chris Doman
By Javvad Malik and Christopher Doman
OTX Trends Part 1- Exploits
January 16, 2018 | Chris Doman
By Javvad Malik and Christopher Doman
2017 NopSec State of Vulnerability Risk Management Report
November 27, 2017 | Michelangelo Sidagni
With the turning of the leaves and the first cold fall nights, usually at ...
2017 NopSec State of Vulnerability Risk Management Report
November 27, 2017 | Michelangelo Sidagni
With the turning of the leaves and the first cold fall nights, usually at ...
5 Retail Security Tips: Don’t Let Hackers Ruin the Holiday Season
November 24, 2017 | Javvad Malik
While many people will be kicking off their holiday shopping this weekend to ...
Powering the Cisco Threat Intelligence Director with AlienVault OTX Threat Data
November 15, 2017 | John Maguire
We built the AlienVault® Open Threat Exchange® (OTX™) to disrupt the ...
YARA Support and Other Recent Additions to OTX
August 21, 2017 | Chris Doman
AlienVault OTX now supports YARA rules! YARA rules are a great way of ...
The Upgraded AlienVault OTX API & Ways to Score Swag!
August 17, 2017 | Chris Doman
We've made a number of improvements to the depth of data in OTX recently, which ...
Revealing the Power of Cyber Threat Intelligence
July 26, 2017 | Irfan Shakeel
In today’s cyber world, decision makers continuously question the value of ...
The Power of Community: My Real-Life Lesson in Community-Sourced Threat Intelligence
May 15, 2017 | Danielle Russell
Last week, my husband received the dreaded call from our bank.
GhostAdmin: The Invisible Data Thief - Notes from the Underground
February 27, 2017 | Julia Kisielius
Data theft is a major threat to businesses in today’s economy. With large ...
Beginner’s Guide to Open Source Incident Response Tools and Resources
February 21, 2017 | James Fritz
**OSSIM is no longer in use as we focus on delivering enhanced solutions for ...
The Evolution of Threat Intelligence
January 26, 2017 | Chris Doman
Hi! My name is Chris Doman and I‘ve just joined AlienVault to work on the Open ...
Threat Intelligence Feed is for Horses
October 13, 2016 | Russ Spitler
Threat Intelligence Feed. There, I said it. I have not said that phrase in 5 ...
5 Key Questions on Threat Detection Answered by Roger Thornton, AlienVault CTO
September 07, 2016 | Kate Brew
What Makes AlienVault Different? Roger Thornton talks about AlienVault's roots ...
New Threat Detection Platforms for the Midsized Enterprise
August 31, 2016 | Jake Mosher
The threat landscape gets more difficult to navigate every day. Organizations ...
Daserf – A Backdoor to Espionage
August 24, 2016 | Patrick Bedwell
Background Daserf is an example of a backdoor, malware that provides attackers ...
2016 SANS Cyber Threat Intelligence Survey: OTX Highlighted
August 17, 2016 | Kate Brew
AlienVault helped sponsor this year's SANS survey and report on Cyber Threat ...
Intelligent Cyber Defense using Threat Analysis
August 16, 2016 | Irfan Shakeel
Traditional cyber security strategy focuses on blocking known cyber threats and ...
OnionDog – An Example of a Regional, Targeted Attack
August 09, 2016 | Patrick Bedwell
Background Bad actors are getting more sophisticated with the techniques they ...