TECH DIGITAL RESOURCE LIBRARY

Government

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:






Dark Reading Tech Digest: Cybersecurity Threats

by Dark ReadingDec 07, 2016

In this special digital edition of Dark Reading, we cover how business executives should plan for and respond to cybersecurity threats. This issue includes: Five Things Every Business Executive Should Know About Cybersecurity Why Poor Cyber Hygiene Invites Risk The 4 Biggest Mistakes Businesses Make Trying to Secure Endpoints Improving the Security Conversation for CIOs, CISOs, and Board Members Download the issue today!

The information submitted is collected by both UBM and our


The Dangers Of Phishing: Help Employees Avoid The Lure Of Cybercrime

by Kaspersky LabNov 17, 2016

Phishing, which targets employees through fraudulent emails with the intent of getting at sensitive corporate data, is one of the biggest threats to corporate IT security. In fact, Kaspersky Lab's own research shows that in the aftermath of a phishing attack, professional services are usually required to restore normal service, leading to costly budget overruns.Phishing, which targets employees through fraudulent emails with the intent of getting at sensitive corporate data, is one of the


Cybercriminals: Unmasking The Villain

by Kaspersky LabNov 17, 2016

With all of the overwhelming statistics on cybercrime, it can be easy to forget that there are actual people behind these facts and figures.

Have you ever wondered who they are? What countries they come from? Who are their top targets?

As a leader in cybercrime analysis, Kaspersky Lab's GReAT (Global Research and Analysis) team has the answers to your questions in our new eBook, Cybercriminals: Unmasking the Villain, where you can find out such fascinating facts about the


Healthcare Ransomware: Hospitals On Hold

by Kaspersky LabNov 17, 2016

Hospital operations coming to a grinding halt. Patients being admitted by handwritten records. And a mysterious message explaining that the only way to get things back up and running is to pay a ransom. It's a scenario that is all too familiar to many hospitals around the country, and it's only getting worse as cybercriminals realize how easily they can penetrate the weak security at many hospitals.

How does a healthcare organization protect itself and keep operations running


Shooting the Messenger: Understanding the Threats to the Media and Broadcasting Industry

by Digital ShadowsNov 16, 2016

Amid all of the noise, it's often tricky for organizations to identify and prioritize the threats they face online. Organizations in the media and broadcasting industry are no exception.

This paper explores:
- Trends in the threats seen in 2016 for broadcasting and media organizations
- The steps that can be taken to prevent and mitigate potential threats


Four Strategies to Reduce Your Open Source Risk

by Rogue Wave SoftwareNov 19, 2014

Try to think of a single system in the world that hasn't been touched by open source software. Whether included in the product or as part of the development environment, open source plays a dominant role in the success of software development teams everywhere. It's not surprising that every developer has their favorite open source tool to solve particular problems because they understand the substantial time and cost savings when reusing code built by an expert code they don't have to worry


Defense Strategies for the Growing Threat of Ransomware

by ibossNov 04, 2016

Ransomware exploits are pervasive and continue to threaten organizations in every industry. A recent study found that globally, 50% of companies have incurred ransomware attacks. This e-book explains how ransomware works and why it has been so successful. It also offers practical steps you can take to ensure your organization doesn't become ransomware's next victim. Read this e-book and change your approach to defending against elusive ransomware attacks.


Software Vendor Avoids Hiring an Expensive Incident Response Firm

by cybereasonNov 02, 2016

When a government agency tells a company it's the likely target of a cyber attack, the organization's security team takes the warning seriously. But what if the warning was false?

In this case study you will learn:
- How the company's security team used Cybereason to answer the question "Are we under attack?"
- How the organization avoided hiring an expensive incident response firm by using Cybereason.
- How Cybereason constructs a complete attack story.


Cybereason 2016 Threat Insights Report

by cybereasonNov 02, 2016

The billions of data points collected and analyzed by the Cybereason platform have demonstrated a clear trend in the threat landscape: the adversaries, targeting companies across geographies and industries are increasing in complexity.

Our analysis shows that 46% of attacks are never-before-seen and cannot be detected by exclusively relying on traditional means, such as IOCs. Download this report to learn what tactics adversaries are using to defeat traditional security measures and


Three Reasons Why Endpoints Cannot Remain a Security Blind Spot

by cybereasonNov 02, 2016

After a period of stagnation, endpoint security is undergoing a renaissance with a slew of products debuting in the market. Antivirus software's promise of constant protection is unrealistic, giving rise to the more practical approach of detection and incident response at the user device.

In this quick read, you'll learn Cybereason's take on:
- Why endpoint visibility increases the chances for early detection
- How using endpoint data can eliminate false positives
-


SUBTOPICS:

cybereason

Founded by elite Israeli-Intel cybersecurity experts, Cybereason is an endpoint detection and response platform, deploying a user-level easy to deploy, frictionless endpoint silent sensor and deploying an analytical engine to detect even faint evidence of malicious activity. Cybereason reconstructs evidence into a clear image of a cyberattack in context. This enables enterprises to discover sophisticated targeted threats at a very early stage, and effectively respond to them, reducing the costs and damages caused by such attacks.

Cybereason is headquartered in Boston, MA with offices in Tel Aviv, Israel.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


Digital Shadows

Digital Shadows provides cyber situational awareness to help organizations protect against cyber attacks, loss of intellectual property, and loss of brand and reputational integrity. We are jointly headquartered in London and San Francisco. Digital Shadows helps large multi-national organizations in sectors including finance, retail, pharmaceuticals and oil and gas. Our flagship solution, Digital Shadows SearchLight,is a scalable and easy-to-use data analysis platform that provides a complete view of an organization's digital footprint and the profile of its attackers. SearchLight is complemented with support from our world-class intelligence operations team to ensure extensive coverage, tailored intelligence and frictionless deployment. Digital Shadows helps our customers see their organizations through an "attacker's eye view" and keep their assets and reputation intact.


iboss

Since its inception, iboss has challenged the status quo in enterprise security, launching innovative, patented technology delivered direct-to-cloud via proprietary node-based cloud container architecture. iboss advanced threat defense features gives security professionals visibility into previously hidden communication channels, and the security tools needed to close the critical data protection gap that can leave even the largest networks vulnerable.


Rogue Wave Software

Rogue Wave Software, Inc. is the leading provider of enterprise class C++ components and infrastructure that enable organizations to build and deploy high performance applications. Only Rogue Wave provides the most complete C++ technology stack including C++ components, UI components, run-time infrastructure, and services. Today, thousands of organizations worldwide have chosen Rogue Wave.