TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

The Year in Security 2018

by Dark ReadingDec 07, 2018

This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.

IN THIS REPORT: Meltdown, Spectre Likely Just Scratch the Surface of Microprocessor Vulnerabilities Cyberattack Aimed to Disrupt Opening of Winter Olympics Fileless Attacks Jump 94% in First Half of 2018 Destructive 'VPNFilter' Attack Network Uncovered Schneider Electric: TRITON/TRISIS Attack Used Zero-Day Flaw in its Safety Controller System, and a RAT Memcached

  • Dark Reading
  • Security
  • Endpoint Security
  • Cybersecurity
  • Network & Perimeter Security
  • Security Management & Analytics
  • Security Monitoring
  • Risk Management/Security
  • Cloud Security
  • Database Security
  • Security platforms
  • SMB Security
  • Details

Developing a Customized Defense Against Targeted Attacks

by Anomali, Inc.Dec 06, 2018

"Targeted attack" doesn't necessarily mean sophisticated malware and nation-state threat actors. What it does mean, is that the attack will be aimed directly at your organization, so your defenses should be focused where targeted attackers will hit you hardest. So who wants what corporate intellectual property, who wants to take down what system, who wants to cause harm to what individual, and what tools and know-how do these threat actors have at their disposal? This webinar can help. Join


The 3 Key Technologies to Transform Customer Experience

by SerenovaDec 05, 2018

Enterprises that seek to transform the customer experience have focused in on three critical technologies: Cloud Omnichannel Analytics But many enterprises remain unclear about exactly what these technologies are and how they will actually be used to create the customer experience of the future. In this expert-led webinar, Sebastian Menutti of Frost & Sullivan will provide research data and in-depth analysis that will help you understand the technologies that will drive the transformation of

  • Cloud
  • Analytics
  • Customer Experience
  • Details

Enterprise Software Options: Legacy vs. Cloud

by InformationWeekDec 05, 2018

InformationWeek's December Trend Report helps IT leaders rethink their enterprise software systems and consider whether cloud-based options like SaaS may better serve their needs.

Enterprise applications and software systems have a reputation for being clunky, expensive, and almost impossible to keep up to date, but that doesn't need to be the case. Rethinking your software strategy to include cloud options like SaaS can reap benefits, but beware the pitfalls.

IN THIS

  • InformationWeek
  • Enterprise
  • Software
  • Cloud
  • Cloud Services
  • Software as a Service
  • Details

Cybersecurity Insider 2018 Threat Intelligence Report

by AnomaliNov 29, 2018

77% of respondents say that threat intelligence is very to extremely important to their organization's overall security posture.

Threat intelligence has become a significant weapon in the fight against cybersecurity threats, and a large majority of organizations have made it a key part of their security strategies.

Among the key findings of the report are that organizations are leveraging threat intelligence data for a number of use cases, and many rate themselves fairly

  • Anomali
  • Cybersecurity
  • Risk Management/Security
  • Details

Threatscape of the US Election

by AnomaliNov 28, 2018

Cyber Attacks Targeting Political Elections Are In Full Swing

The aftermath of the 2016 US Presidential election left many Americans questioning the integrity of the election infrastructure. Fast-forward to the US 2018 midterm election, and you'd be hard-pressed to avoid seeing security researchers and media outlets discussing threats posed to nation's election infrastructure.

A wide range of threat actors pose risks to the elections from sophisticated, state-sponsored

  • Anomali
  • Cybersecurity
  • Security Monitoring
  • Details

NotPetya: One Year Later

by AnomaliNov 28, 2018

This whitepaper examines the NotPetya cyber-attack that occurred in late June 2017. Almost immediately following the WannaCry cyberattack, the NotPetya malware affected countries and organizations around the globe that had strikingly similar repercussions and lessons to take away.

We analyzed how organizations implemented policy or procedural changes, if any, immediately following WannaCry as well as within the past year to improve their resilience to the ever-changing cyber threat

  • Anomali
  • Cybersecurity
  • Risk Management/Security
  • Details

STIX/TAXII: What You Need to Know

by AnomaliNov 28, 2018

Structured Threat Information eXpression (STIX) and Trusted Automated eXchange of Intelligence Information (TAXII)

The old adage of "sharing is caring" is paramount within the cyber threat intelligence community. Quick and in-depth transfer of knowledge between individuals, organizations, products, and platforms can lead to improved prevention and mitigation of cyber-attacks. There are many sources of information possible for acquiring such knowledge, but sharing opens many questions:

  • Anomali
  • Cybersecurity
  • Security Monitoring
  • Details

Empowering Contact Center Agents through Better Analytics

by Five9, Inc.Nov 20, 2018

More now than ever, contact centers are using performance and KPI results to motivate and channel agent behavior. Some examples include real-time analytics of customer interactions, improved customer data analytics, and agent performance analysis tools. Contact centers that deploy these statistics to agents can gain the competitive advantage that comes when agents understand how their activities impact the overall success of their teams and company. Join No Jitter, Five9, and Nemertes Research

  • Customer Support
  • Analytics
  • Contact Centers
  • Details

How Enterprises Are Using IT Threat Intelligence

by Dark ReadingNov 20, 2018

Concerns over nation-state actors and other security threats are driving enterprises to rethink the way they collect and analyze cybersecurity data. A high percentage of organizations are seeking to augment their internal telemetry with external threat data so they can identify and respond to potential data compromises faster. However, collecting and analyzing threat intelligence is no easy task — early implementers report being slowed by manual data correlation and analysis processes.

  • Dark Reading
  • Security Monitoring
  • Risk Management
  • Details