TECH DIGITAL RESOURCE LIBRARY

Government

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:






Streaming Prevention In Cb Defense: Stop Malware & Non-Malware Attacks

by Carbon BlackFeb 23, 2017

Replace AV with streaming prevention uniquely built to stop both malware and non-malware attacks - Download the White Paper


Carbon Black Threat Report: Non-Malware Attacks and Ransomware Take Center Stage in 2016

by Carbon BlackFeb 23, 2017

Startling new trends show a rapid rise of non-malware attacks and success of ransomware - Download the Threat Report


Cybersecurity Needs Attention Infographic

by MalwarebytesFeb 21, 2017

IDG Connect surveyed over 200 organizations in the US to learn more about the cyber threats they face, how they manage them and where they think the most effective improvements to current cybersecurity systems can be made.


2017 State of Malware Report Whitepaper

by MalwarebytesFeb 21, 2017

In 2016, we finally saw the headlines catch up with the hype. Cyberattacks and cybersecurity, or a lack thereof, grabbed media attention on both the corporate and consumer sides, even becoming a key issue in the US presidential election. In this respect, you could say that everyone, even those who have never logged on, was affected by cyberattacks and hacking in 2016.


2017 State of Malware Report Infographic

by MalwarebytesFeb 21, 2017

In 2016, we finally saw the headlines catch up with the hype. Cyberattacks and cybersecurity, or a lack thereof, grabbed media attention on both the corporate and consumer sides, even becoming a key issue in the US presidential election. In this respect, you could say that everyone, even those who have never logged on, was affected by cyberattacks and hacking in 2016.


The Global Impact of Ransomware on Business

by MalwarebytesFeb 21, 2017

Ransomware has become one of the biggest cyber security threats in the world, with instances of ransomware in exploit kits increasing about 44% in the last six months. The business of ransomware is on pace to be a $1 billion a year crime.

Through an exclusive survey with Osterman Research of more than 500 CIOs, CISOs and IT Directors in the U.S., Canada, Germany and the U.K., Malwarebytes is dedicated to helping businesses prevent ransomware.


The Top 5 Security Threats to Your Business

by Level 3 CommunicationsMay 07, 2015

Cyber security breaches are more common now than they have ever been. While they don't all make news headlines, they affect numerous businesses every single day. What exactly are these threats? How are they carried out and how can they impact business? The Level 3 Advanced Threat Intelligence team has identified the top five most common security threats that you should know about. Download this infographic to find out more.


A False Sense of Cybersecurity: Three Pitfalls to Avoid

by LeidosFeb 07, 2017

The cyber awakening has many companies evaluating current security measures including people, processes and tools. The conversations within our organizations have evolved, but are the investments we're making truly protecting us against today's sophisticated adversaries?

This paper discusses three common pitfalls facing organizations actively pursuing cybersecurity maturity. Read up on how you can avoid them and better protect your critical assets.


SOC vs. SIC: The Difference of an Intelligence Driven Defense Solution

by LeidosFeb 07, 2017

Traditional Security Operations Centers (SOCs) are finding their response-driven methods for combatting cyber-attacks are no match for today's threat landscape!

This white paper discusses: Inherent limitations of a traditional SOC model Advanced capabilities of a Security Intelligence Center (SIC) Necessary steps to transforming cybersecurity defense in your organization


Practical Guide to Measuring Cyber Resiliency and Effectiveness

by LeidosFeb 07, 2017

Measurement of resiliency and effectiveness must be threat focused and threat specific. This guide provides reporting tips to help you stay ahead of advanced persistent threats by: Defining the Threat with a Campaign Heat Map Proving Effectiveness with a Mitigation Scorecard Mitigate Gaps to Improve with a Technology & Capability Matrix


SUBTOPICS:

Carbon Black

Carbon Black has designed the most complete next-gen endpoint-security platform, enabling organizations to stop the most attacks, see every threat, close security gaps, and evolve their defenses. The Cb Endpoint Security Platform helps organizations of all sizes replace legacy antivirus technology, lock down systems, and arm incident response teams with advanced tools to proactively hunt down threats. Today, Carbon Black has approximately 2,000 worldwide customers, including 25 of the Fortune 100 and more than 600 employees. Carbon Black was voted Best Endpoint Protection by security professionals in the SANS Institute's Best of 2015 Awards.


Leidos

We are Defenders
While defending cyber interests globally for over a decade we've developed a skilled team, advanced capabilities and a proven framework to proactively protect what matters most. Our solutions promote a mature cybersecurity posture.

Driven by Intelligence
Cyber adversaries are continuously evolving their operations and techniques and so are we. Using our Intelligence Driven Defense® solutions we analyze intelligence left behind by attackers to identify persistent threat actors and anticipate future attacks.


Level 3 Communications

Level 3 Communications is a global communications provider headquartered in Broomfield, Colo. The company builds, operates, and maintains a global network to deliver managed solutions for enterprises, carriers, and governments, including fiber-based infrastructure and data center solutions, IP-based voice and data communications, video and content distribution, security solutions, and cloud-based data center services. Level 3 services customers in more than 60 countries spanning six continents.


Malwarebytes

Headquarters: San Jose CA 95113

Malwarebytes provides anti-malware and anti-exploit software designed to protect businesses and consumers against zero-day threats that consistently escape detection by traditional antivirus solutions. Malwarebytes Anti-Malware earned an "Outstanding" rating by CNET editors, is a PCMag.com Editor's Choice, and was the only security software to earn a perfect malware remediation score from AV-TEST.org. That's why more than 50,000 SMBs and Enterprise businesses worldwide trust Malwarebytes to protect their data. Founded in 2008, Malwarebytes is headquartered in California, operates offices in Europe, and employs a global team of researchers and experts