TECH DIGITAL RESOURCE LIBRARY

Security

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Ponemon Study: Managing the Risk of Post-breach or "Resident" Attacks

by Illusive NetworksNov 14, 2018

How well-equipped is your organization to stop insider attacks or external attackers once they're inside your network? According to this study, almost two-thirds of respondents lack efficient capabilities to detect and investigate "stealth" attackers before serious damage occurs.

This report, summarizing insights provided by over 600 IT and IT security professionals, sheds light on:

•The challenge to align security programs with top business risk priorities


The Five Essential Capabilities of an Analytics-Driven SOC

by SplunkNov 14, 2018

Due to recent cyberattacks, security operations centers (SOCs) have had to focus on a holistic and cohesive security strategy by consolidating the right people, processes and technology to mitigate and remediate attacks.This white paper dives into the necessity of SOCs to be analytics driven and how it helps IT and business leaders assess their own risk levels.


The Seven Essential Capabilities of an Analytics-Driven SIEM

by SplunkNov 14, 2018

SIEM (security information and event management) software offers a lot of promise, but legacy SIEMs simply can't keep up with the rate and sophistication of today's cyberattacks. Download your complimentary copy of 'The Six Essential Capabilities of an Analytics-Driven SIEM' and learn how to dramatically improve your security posture, advanced threat detection and incident response.


The SOAR Buyer's Guide

by SplunkNov 14, 2018

Choosing the right platform to build your company's security operations center is arguably more important than choosing any point security product. But are you aware of the criteria you should consider when evaluating which Security Orchestration, Automation and Response (SOAR) platform to choose? Download the buyer's guide to learn how.


How Enterprises Are Attacking the Cybersecurity Problem

by Dark ReadingNov 14, 2018

Dark Reading's 2018 Strategic Security Survey of 300 IT and security professional shows that a majority of organizations are continuing to increase spending on security products and technologies. Data breach fears and the need to comply with regulations such as the European Union's General Data Protection Regulation are two major drivers of the spending. But other factors — such as increased threat sophistication and concerns over a broadening attack surface — are contributing to the


Investigation or Exasperation? The State of Security Operations

by SplunkNov 14, 2018

62% of firms are being attacked at least weekly and 45% are experiencing a rise in the number of security threats. IDC surveyed security decision makers at 600 organizations to understand if there are processes in place to investigate and respond to these incidents. Download this IDC InfoBrief and discover the consolidated time security teams spend on incident responses, how they cope with an average of 40 actionable security incidents per week and where organizations are focusing their security


Gartner Report: 2017 Critical Capabilities for SIEM

by SplunkNov 14, 2018

The Gartner 2017 Magic Quadrant (MQ) for Security Information and Event Management report details SIEM market trends and provides a comprehensive vendor evaluation criteria for 19 solutions based on completeness of vision and ability to execute. Download this Gartner report to learn: -Why Splunk was named a leader for the fifth year in a row -The strengths and weaknesses of 19 SIEM vendors Critical insights into how to choose a SIEM solution wisely


Three New DDE Obfuscation Methods

by ReversingLabsNov 11, 2018

On September 10, 2018, the ReversingLabs Research team, working with other cybersecurity experts from Cisco Talos, uncovered a new spam campaign. The attack is spreading the Adwind 3.0 remote access tool (RAT) targeting Windows,Linux and Mac OSX operating systems. Most of the targets in this campaign are in Turkey, according to data from Cisco's Umbrella cloud security platform. Further research revealed important details about the attack and the forged Microsoft Office documents that the


Frost & Sullivan Report: SOC-as-a-Service Versus DIY SOC

by Arctic Wolf NetworksNov 09, 2018

Cybersecurity strategies often require a trade-off between overall effectiveness and the cost of cybersecurity controls. So, how do you determine what is the total cost of ownership (TCO) of people, process and technologies that keep any organization's assets protected from cybercriminals and malicious insiders?

In this cost analysis conducted by Frost & Sullivan, they determined that organizations with few, if any, dedicated infosec personnel spend over a three-year period up to 8.8


A Cybersecurity Checklist for SaaS Applications

by Arctic Wolf NetworksNov 09, 2018

Today's digital perimeters grant authorized users anytime/anywhere access to sensitive business data. Because of this, SaaS-heavy IT environments introduce a higher complexity to threat detection and response efforts.

This checklist helps identify some of the core security-related SaaS activities that companies should continuously monitor and associates them to the types of incidents that may potentially be detected. Download it today!


SUBTOPICS:

Arctic Wolf Networks

Headquarters: 111 W. Evelyn Ave, Suite 115, Sunnyvale 94086

Arctic Wolf redefines the economics of security with a turnkey SOC-as-a-service that deploys in minutes. Concierge Security Engineers use the AWN Platform to provide tactical and strategic insights into your security to answer the question, "Am I safe?" We lead the industry in making security simple, actionable and affordable for mid-market companies.

AWN CyberSOC eliminates the need to build your own SOC, which requires a SIEM, additional security products and security staff. We fortify your security infrastructure with comprehensive "detection and response." We identify attacks that bypass perimeter defenses, such as advanced persistent threats and breaches due to human fallibility. Hundreds of companies trust us to deliver insights without the noise and keep them safe.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


Illusive Networks

Headquarters: Tel Aviv, Israel

Illusive Networks is a cybersecurity firm headquartered in Tel Aviv, Israel. The company produces technology that deceives cyber attackers by planting false information about given network's resources.


ReversingLabs

We have a simple mission: To use our experience and expertise from the security world to provide state of the art solutions for organizations to protect all their digital assets.


Splunk

Splunk was founded to pursue a disruptive new vision: make machine data accessible, usable and valuable to everyone. Machine data is one of the fastest growing and most pervasive segments of "big data" - generated by websites, applications, servers, networks, mobile devices and the like that organizations rely on every day. By monitoring and analyzing everything from customer clickstreams and transactions to network activity and call records -and more, Splunk turns machine data into valuable insights no matter what business you're in. It's what we call operational intelligence.