TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Purple Team Tactics and Threat Intelligence for Effectively Training Your Cybersecurity Team

by Caendra Inc.Oct 23, 2018

In this webinar, you will see how purple team tactics and tactical threat intelligence can be used to enhance your security team's capabilities against the next-generation cyber-attacks.

It has been proven that adding security technology cannot completely eliminate cyber-attacks however, training the human can definitely upgrade an organization's security posture. In this webinar, IT security managers and operators will witness how (advanced) adversary simulation, TTP reverse

  • Vulnerabilities & Threats
  • Details

Outsmart Malware

by VirusTotalOct 22, 2018

VirusTotal Intelligence lets you hunt for malware threats that affect your networks

You are probably familiar with VirusTotal as a basic malware research tool. Did you know that VirusTotal Intelligence (VTI), an advanced analytics layer over the VirusTotal database, helps you perform malware threat hunting, relationship and behavioral visualization, and historical analysis on billions of malware samples?

With VirusTotal Intelligence (VTI), you can better defend against malware

  • VirusTotal
  • Security Monitoring
  • Risk Management
  • Details

Investigating Malware Threats Within your Network

by VirusTotalOct 22, 2018

VirusTotal Intelligence provides extensive information to accelerate malware threat investigations. Analysts can quickly build a picture of an attack and then use the information to better protect against other attacks.

In the course of an investigation, security analysts and incident responders are often presented with a file hash and asked to make sense of an attack. Unfortunately, this is like being given only a bullet and then asked to uncover the entire plot of a crime scene. Without

  • VirusTotal
  • Security Management & Analytics
  • Security Monitoring
  • Details

Shutting Down Banking Trojans

by VirusTotalOct 22, 2018

Disable banking trojans with VirusTotal Intelligence's advanced capabilities

Certain industries are especially at risk of password-stealing trojans, which capture customers' account credentials and then use those to transfer funds. Financial services are at a very high risk of credential theft, which leads to increased cost as well as reputation damage.

This paper describes, in details, how to use VTI to gather the information necessary to shut down the infrastructure that supports

  • VirusTotal
  • Security Management & Analytics
  • Security Monitoring
  • Details

Mitigating False-Positives to Improve Software Publishing

by VirusTotalOct 22, 2018

For software publishers as well as corporate developers, antivirus false positives can stop users in their tracks and shut down revenue. VirusTotal Monitor creates an accelerated path to resolving false positive results -- before they cause harm.

Most users see VirusTotal as a tool for detecting malware and malicious behavior. As one of the world's largest malware intelligence services, VirusTotal is used by millions of people every day to perform basic research on

  • VirusTotal
  • Security Management & Analytics
  • Security Monitoring
  • Details

United States of America Cybersecurity Profile

by AnomaliOct 22, 2018

The most powerful country in the world has one of the oldest and most sophisticated cybersecurity programs. Attributed to attacks against countries like Iran, including Stuxnet. The United States has a track record of using offensive techniques against potential threats to national security.

The United States has an increasingly complex foreign policy climate, which is likely to create events in which offensive cyber-attacks will be weighed as an option. In order for cyber defenses to

  • Anomali
  • Cybersecurity
  • Security Management & Analytics
  • Details

SANS 2018 Threat Hunting Survey Results

by AnomaliOct 22, 2018

Threat Hunting is Not Simply a Compromise Assessment or Continuous Security Monitoring

Ultimately, threat hunting is an approach that drives security benefits across the organization by making sure that human adversaries are met by human defenders who are taking full advantage of the environment that they defend.

Top survey findings:

• Threat intelligence leads threat hunting
• Trained staff are key to running threat hunting engagements
• Hunting showing

  • Anomali
  • Security Management & Analytics
  • Network & Perimeter Security
  • Details

The Changing Landscape of U.S. Election Security

by AnomaliOct 22, 2018

Protecting the Sanctity of the Ballot Box Against Cyberthreats Depends On Legislation, Enforcement, and Sharing Up-To-Date Threat Intelligence Data

Confidence in the honesty of election system has hit record lows, yet the federal executive branch still has not articulated an overarching strategy and plan of action to secure them. Disparate election systems operate with little standardization and no unified oversight, making them particularly vulnerable in the face of growing cybersecurity

  • Anomali
  • Security Management & Analytics
  • Network & Perimeter Security
  • Details

Turkish Hacktivists Respond to US Sanctions: Anomali Labs Cyber Threat Brief

by AnomaliOct 22, 2018

Escalation Between Turkey and the US Provokes a Response from Cyber Groups

The recent escalation in tensions between the United States and Turkey over the detention of pastor Andrew Brunson has prompted Turkish patriotic hacktivists groups to target American websites

Historically, the two most prominent hacktivist groups Aslan Neferler Tim (ANT) and Turk Hack Team (THT) have reacted to political issues impacting Turkey, by targeting the perceived adversary with low-level nuisance

  • Anomali
  • Security Management & Analytics
  • Cybersecurity
  • Details

Prevent Targeted Data Breaches with Eight Steps

by Check Point Software Technologies Ltd.Oct 19, 2018

Cyber criminals continue to unleash data breach attacks on organizations around the globe. In 2017, the average cost of a breach for a U.S. company was an estimated US$8 million. Such attacks are becoming more targeted, evasive, and lucrative. It's no long a matter of if, but when your organization will suffer a data breach. The good news is that the eight steps outlined in this paper can go far to prevent a targeted data breach.

  • Check Point Software Technologies Ltd.
  • Cybersecurity
  • Security Monitoring
  • Details