The most recent posts from across the AlienVault blogs.
2k followers 3 artículos/semana
Why Firewalls Are Not Enough in Today’s Cybersecurity Landscape

The content of this post is solely the responsibility of the author.  LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Firewall technology has mirrored the complexities in network security, evolving significantly over time. Originally serving as basic traffic regulators based...

Wed Jun 5, 2024 19:31
Penetration Testing of A.I. Models

Penetration testing is a cornerstone of any mature security program and is a mature and well understood practice supported by robust methodologies, tools, and frameworks. The tactical goals of these engagements typically revolve around identification and exploitation of vulnerabilities in technology, processes, and people to gain initial, elevated,...

Tue Jun 4, 2024 13:06
Security Testing in Software Development: Assessing Vulnerabilities and Weaknesses

The content of this post is solely the responsibility of the author.  LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article.  The critical role of security testing within software development cannot be overstated. From protecting personal information to ensuring that critical infrastructure...

Mon Jun 3, 2024 12:59
Transitioning from On-Premise Storage to AWS Cloud: A Strategic Guide for Companies

The content of this post is solely the responsibility of the author.  LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article.  In today’s digital world, businesses face the challenge of managing ever-expanding volumes of data efficiently and securely. Traditional on-premise storage solutions...

Thu May 30, 2024 13:05
Volatile Data Acquisition on Linux Systems Using fmem

The content of this post is solely the responsibility of the author.  LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Memory forensics is a critical aspect of digital forensics, allowing investigators to analyze the volatile memory of a system to uncover evidence of malicious...

Wed May 29, 2024 13:08
The Evolution of Cyber Threats in the Age of AI: Challenges and Responses

"In war, the importance of speed cannot be overstated. Swift and decisive actions often determine the outcome of battles, as delays can provide the enemy with opportunities to exploit weaknesses and gain advantages." - General Patton, "Leadership and Strategy in Warfare," Military Journal, 1945. Cybersecurity has become a battlefield where defenders...

Tue May 28, 2024 13:08

Crea tu propio feed de noticias

¿Listo para probarlo?
Comienza una prueba de 14 días, no es necesaria tarjeta de crédito.

Crear cuenta