AristotleInsight Blog

Welcome to the Sergeant Laboratories Blog Space.  Here we will share news and tips about using AristotleInsight as well as share commentary, stories, and opinions on information security, audit, governance, and compliance topics.

ARISTOTLEINSIGHT® ANNOUNCES VULNERABILITY GATEWAY GRC IN VERSION 7.9

AristotleInsight® has introduced Vulnerability Gateway (VG) GRC in its latest release. The VG GRC feature continuously identifies risks and directs users on how to remediate them, all while [...]

Read More

EXPLAIN VULNERABILITY & RISK METRICS TO MANAGEMENT

Sergeant Laboratories is excited to announce the launch of a new information series to highlight top issues present in the information security industry. To launch this important new series, [...]

Read More

ARISTOTLEINSIGHT’S® DIRECTIONAL MATRIX PROVEN INVALUABLE FOR REAL-WORLD CYBER SECURITY SITUATION

Sergeant Laboratories is excited to reveal that its flagship product, AristotleInsight, proved key in helping a customer identify an advanced persistent threat (APT) cyber attack. The client [...]

Read More

HUNT TEAMS – STILL A GOOD IDEA

Hunt Teams — not a new concept to cyber security, though not well known — are groups of cyber investigators that actively seek out threats on a network. What makes Hunt Teams unique [...]

Read More

MANAGEMENT BY MEANINGFUL OBJECTIVE

The seemingly continuous disclosure of information security failures demonstrates the consequences of bad governance and bad management. Revered executive teams, boasting MBAs from our [...]

Read More

ARE CYBER SECURITY VENDORS THE WORSE CRIMINALS

There is no doubt that those who maliciously attack IT environments or steal data are criminals who need to be prosecuted. Unfortunately, some of the inventive malware used to commit crimes, [...]

Read More

INFO SECURITY'S LACK OF SOLUTIONS TO TRACK, TREND, AND MEASURE PROCESSES

The security and compliance industry is advancing at a frantic rate, yet due to years of perceived unimportance, still lags behind other departments of enterprise. In other words, security and [...]

Read More

THE CHALLENGE OF BOARD ROOM BUY IN

One of the top complaints raised by CISOs and CSOs is a lack voice in the boardroom. From David Barton, CISO at Websense in an article for csoonline.com: “Too many CISOs are relegated to [...]

Read More

MORE RULES DOESN'T EQUAL BETTER SECURITY

The marketing for just about every SIEM type solution available touts huge numbers of “built-in” or “out of the box” rules included in the solution. The assumption seems to be that 700 built-in [...]

Read More

CUTTING THROUGH THE FOG OF MORE

Originally published via LinkedIn over a year ago, the problem of “The Fog of More” still exists. Security professionals still spend too much time fighting to install, configure and maintain [...]

Read More

1

2

>

Page 1 of 2

Schedule a Demo