AristotleInsight Blog

Welcome to the Sergeant Laboratories Blog Space.  Here we will share news and tips about using AristotleInsight as well as share commentary, stories, and opinions on information security, audit, governance, and compliance topics.

OPERATION ELIGIBLE RECEIVER - THE BIRTHPLACE OF CYBERSECURITY: VULNERABILITIES

More than 20 years ago, the NSA conducted an exercise named Operation Eligible Receiver 97. The purpose of the exercise was to test the response capabilities of critical Department of Defense [...]

Read More

OPERATION ELIGIBLE RECEIVER - THE BIRTHPLACE OF CYBERSECURITY: CONFIGURATIONS

More than 20 years ago, the NSA conducted an exercise named Operation Eligible Receiver 97. The purpose of the exercise was to test the response capabilities of critical Department of Defense [...]

Read More

WARNING SIGNS FOR MANAGING CYBERSECURITY

In 1997, the NSA attacked the Department of Defense information infrastructures and attempted to breach their network. The attack was codenamed Operation Eligible Receiver 97 [...]

Read More

ARISTOTLEINSIGHT® ANNOUNCES VULNERABILITY GATEWAY GRC IN VERSION 7.9

AristotleInsight® has introduced Vulnerability Gateway (VG) GRC in its latest release. The VG GRC feature continuously identifies risks and directs users on how to remediate them, all while [...]

Read More

EXPLAIN VULNERABILITY & RISK METRICS TO MANAGEMENT

Sergeant Laboratories is excited to announce the launch of a new information series to highlight top issues present in the information security industry. To launch this important new series, [...]

Read More

ARISTOTLEINSIGHT’S® DIRECTIONAL MATRIX PROVEN INVALUABLE FOR REAL-WORLD CYBER SECURITY SITUATION

Sergeant Laboratories is excited to reveal that its flagship product, AristotleInsight, proved key in helping a customer identify an advanced persistent threat (APT) cyber attack. The client [...]

Read More

HUNT TEAMS – STILL A GOOD IDEA

Hunt Teams — not a new concept to cyber security, though not well known — are groups of cyber investigators that actively seek out threats on a network. What makes Hunt Teams unique [...]

Read More

MANAGEMENT BY MEANINGFUL OBJECTIVE

The seemingly continuous disclosure of information security failures demonstrates the consequences of bad governance and bad management. Revered executive teams, boasting MBAs from our [...]

Read More

ARE CYBER SECURITY VENDORS THE WORSE CRIMINALS

There is no doubt that those who maliciously attack IT environments or steal data are criminals who need to be prosecuted. Unfortunately, some of the inventive malware used to commit crimes, [...]

Read More

INFO SECURITY'S LACK OF SOLUTIONS TO TRACK, TREND, AND MEASURE PROCESSES

The security and compliance industry is advancing at a frantic rate, yet due to years of perceived unimportance, still lags behind other departments of enterprise. In other words, security and [...]

Read More

1

2

>

Page 1 of 2

Schedule a Demo