UBM: TECH DIGITAL RESOURCE LIBRARY

Government

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:






Ransomware is Here: What you can do about it.

by SentinelOneJul 29, 2016

Dive into the details of what ransomware means, where it comes from, how it acts and what you can do to stop it in its tracks.


The Incident Response Success Checklist: Nine Critical Steps Your Current Plan Lacks

by cybereasonJul 26, 2016

Details matter when developing an incident response (IR) plan. But, even the most successful IR plans can lack critical steps, impeding how quickly normal business operations are restored. Read our brief guide to: 1. Learn the nine important steps you should incorporate into your IR plan. 2. Discover how to incorporate these steps into your organizations' routine. 3. Measure your improvement


Five Emerging Threats Enterprise Security Must Not Ignore

by cybereasonJul 26, 2016

Cybereason's researchers have reviewed data from 1 million customer endpoints, including computers and servers in some of the world's best known and frequently targeted companies, to gather insight on the latest techniques, tactics and procedures used by adversaries. Read about the five emerging threats our research team has determined enterprise security cannot ignore.


OSX.Pirrit: The Minds Behind the Malicious Mac Adware

by cybereasonJul 26, 2016

In his latest research report, Cybereason senior security researcher Amit Serper reveals what company is behind OSX.Pirrit. This particularly nasty piece of adware, which targets Mac OS X, has traits typically seen in malware, like persistence and the ability to gain root access.


Returning Power to the Defenders: The Four Secrets of Combating APTs

by cybereasonJul 26, 2016

Nation-states are not the only ones using advanced persistent threats to carry out attacks. APT techniques are now employed by various adversaries to target companies and steal their most coveted assets. Fortunately, there are ways for defenders to regain power. This white paper discusses the four highly effective and often overlooked ways to fight APTs, including: >Visibility helps security teams know their enemy >Use analytics to develop threat intelligence >Use threat intelligence to


You Will Be Breached

by cybereasonJul 26, 2016

Attackers have a 100% success rate when penetrating networks. Accepting that a network breach is inevitable requires security teams to adopt a new post-breach mentality. This quick read discusses this mindset shift and offers important actions you can take now.


VULNERABLE by Design: why destructive exploits keep on coming

by enSiloJul 15, 2016

What happens when a threat actor leverages the actual functionality of an Operating System (OS) or an application and uses it against itself? This is where design vulnerabilities come in. In this paper, we review how threat actors bypass OS fortifications such as access controls, sandboxes and space randomization simply by abusing intentional OS functionality. Unfortunately, design vulnerabilities not restricted just to Windows but also to Linux and Mac OS X.


Keeping Financial Institutions Operating

by enSiloJul 15, 2016

When dealing with money, every moment counts. Any delays in trades, transfers, loan closures, etc. can have serious consequences (and costs) for both customers and the financial institutions they have trusted to execute those transactions. For example, brokerage firms can be found liable if they don't execute orders within contractual timeframes. learn how enSilo gives financial institutions peace of mind.


Healthcare - A Cyberattack Target That's Only Getting Bigger

by enSiloJul 15, 2016

Healthcare organizations have long been the target of cyberattacks, due to the high-value personal information they collect and use during the course of their business. enSilo ensures healthcare organizations can effectively protect the privacy and integrity of the sensitive data in their environment and prevent any unauthorized use or exfiltration.


Password Management Evaluation Guide for Businesses

by Keeper SecurityJul 12, 2016

Passwords - and the need for effective password management - are at the heart of the rise in costly data breaches.

Various evolving business challenges complicate password management by increasing exposure to hacking and phishing attacks, or complicating protective measures. To help businesses address these challenges, various password management solutions are entering the marketplace, each with different capabilities.

This white paper provides a guide for evaluating


SUBTOPICS:

cybereason

Founded by elite Israeli-Intel cybersecurity experts, Cybereason is an endpoint detection and response platform, deploying a user-level easy to deploy, frictionless endpoint silent sensor and deploying an analytical engine to detect even faint evidence of malicious activity. Cybereason reconstructs evidence into a clear image of a cyberattack in context. This enables enterprises to discover sophisticated targeted threats at a very early stage, and effectively respond to them, reducing the costs and damages caused by such attacks.

Cybereason is headquartered in Boston, MA with offices in Tel Aviv, Israel.


enSilo

enSilo delivers a real-time data protection platform against advanced attacks by blocking in real-time any data-related malicious activity. enSilo's platform provides full forensics leading to the violation as well as remediation. With enSilo, organizations can continue running their businesses operations securely and without interruption, even during the investigation and remediation of attacks. enSilo is financially-backed by Lightspeed Venture Partners and Carmel Ventures.


Keeper Security

Keeper Security is transforming the way businesses and individuals protect their passwords and sensitive digital assets to significantly reduce cyber theft. As the leading password manager and digital vault, Keeper helps millions of people and thousands of businesses substantially mitigate the risk of a data breach. Keeper is SOC 2 Certified and utilizes best-in-class encryption to safeguard its customers. Keeper protects industry-leading companies including Sony, Chipotle, and The University of Alabama at Birmingham.


SentinelOne

SentinelOne is a startup formed by an elite team of cyber security engineers and defense experts that joined forces to reinvent endpoint protection. With decades of collective experience, SentinelOne founders honed their expertise while working for Intel, McAfee, Checkpoint, IBM, and elite units in the Israel Defense Forces. They came together in 2013 to build a new security architecture that could defeat today's advanced threats and nation state malware.