Threat Intelligence

7/10/2018
11:30 AM
50%
50%

AT&T to Buy AlienVault

Terms of the deal - which closes in Q3 - were not disclosed.

AT&T today announced that it will acquire threat intelligence company AlienVault in a move to extend its security offerings to small-to-midsized organizations.

While terms of the deal were not disclosed, AT&T said it plans to invest in the evolution of AlienVault's Unified Security Management platform and Open Threat Exchange community, and the integration of AlienVault's offerings into AT&T's.

"Regardless of size or industry, businesses today need cyber threat detection and response technologies and services," said Thaddeus Arroyo, CEO of AT&T Business, in a statement. "AlienVault's expertise in threat intelligence will improve our ability to help organizations detect and respond to cybersecurity attacks. Together, with our enterprise-grade detection, response and remediation capabilities, we're providing scalable, intelligent, affordable security for business customers of all sizes."

AT&T said the acquisition is scheduled to close in the third quarter of this year.

Read more here

 

 

 

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
No SOPA
100%
0%
No SOPA,
User Rank: Ninja
7/10/2018 | 8:47:22 PM
Concern With Cybersecurity Acquisitions by Telecoms & ISPs
For months we've been seeing a flurry of cybersecurity sector acquisitions by big money, from ISP management companies to heavy hitter telecoms. I get it - ISP, wireless and cellular service providers are getting hit hard and the key to customers continuing with their current providers - and especially new users signing on - is a sense of security, improved and guaranteed. But this one gives me pause.

AlienVault are the folks behind Open Threat Exchange (OTX). It's one of the coolest communities out there based around threat data sharing and discussion. I jumped on board as soon as I had the opportunity. Part of what made this possible was AlienVault's then independent status, and later collaboration with Intel and HP brought valuable realtime data into the mix. What if AT&T had acquired AlienVault in 2011? Would OTX have even been released, or would it have carried a hefty subscription fee?

I worry acquisition of forward-thinking cybersecurity firms like AlienVault could have a negative impact on projects like OTX. While not the same setup as AlienVault, I can't imagine what would become of RedTeam Security, for example, if Verizon were to acquire them. I hate to see my favorite cyber warriors getting snatched up, but out of respect for their founders I also wish them the best. We wouldn't be where we are today without them.
High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writer,  2/14/2019
Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  2/14/2019
Making the Case for a Cybersecurity Moon Shot
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  2/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-15380
PUBLISHED: 2019-02-20
A vulnerability in the cluster service manager of Cisco HyperFlex Software could allow an unauthenticated, adjacent attacker to execute commands as the root user. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by connecting to the cluster serv...
CVE-2019-3474
PUBLISHED: 2019-02-20
A path traversal vulnerability in the web application component of Micro Focus Filr 3.x allows a remote attacker authenticated as a low privilege user to download arbitrary files from the Filr server. This vulnerability affects all versions of Filr 3.x prior to Security Update 6.
CVE-2019-3475
PUBLISHED: 2019-02-20
A local privilege escalation vulnerability in the famtd component of Micro Focus Filr 3.0 allows a local attacker authenticated as a low privilege user to escalate to root. This vulnerability affects all versions of Filr 3.x prior to Security Update 6.
CVE-2019-10030
PUBLISHED: 2019-02-20
A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.52 and earlier in RejectASTTransformsCustomizer.java that allows attackers with Overall/Read permission to provide a Groovy script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.
CVE-2019-10030
PUBLISHED: 2019-02-20
A exposure of sensitive information vulnerability exists in Jenkins Cloud Foundry Plugin 2.3.1 and earlier in AbstractCloudFoundryPushDescriptor.java that allows attackers with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through anoth...