TECH DIGITAL RESOURCE LIBRARY

Government

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







North Korea Cyber Security Profile

by AnomaliFeb 07, 2018

The Democratic People's Republic of Korea (DPRK) is notorious for aggressive threats against other nations and harsh restrictions imposed on its citizens. The international community has responded to North Korean threats with strict sanctions, which greatly impact the North Korean economy. The origins of this totalitarian regime date back to the end of the Second World War, where the Soviet Union installed a Soviet military officer, Kim Il-sung, as the new country's leader. The North Korean


Cyber Threat Brief: 2018 Winter Olympics

by AnomaliFeb 06, 2018

Major events like the Winter Olympics attract a lot of attention from fans all around the world. For three weeks fans will watch in person, on televisions, and online to follow the various competitive events. This attention is attractive to advertisers, but it's also attractive to cyber criminals who will inevitably use the Games as lures for phishing and other social engineering campaigns. Threats related to the Winter Olympics go deeper than that, however.

This Cyber Threat Brief


Phishing - The Secret of its Success and What You Can Do to Stop It

by F5Feb 06, 2018

Phishing has proved so successful that it is now the number one attack vector. The Anti-Phishing Working Group reports that in the first half of 2017 alone, more than 291,000 unique phishing websites were detected, over 592,000 unique phishing email campaigns were reported, and more than 108,000 domain names were used in attacks. In 2016, the FBI's Internet Crime Complaint Center (IC3) received phishing reports from more than 19,000 victims. However, IC3 also notes that only an estimated 15% of


How UEBA Reduces the Threat of Insider Data Leakage

by VeriatoApr 24, 2017

While organizations invest significant resources to stop hackers from getting company data, the greatest risk to organizational data security are the so-called insiders.


How UEBA Mitigates IP Theft by Departing Employees

by VeriatoApr 24, 2017

An introduction to the benefits of User and Entity Behavior Analytics in assessing employee behavior.


Strategies for Monitoring and Measuring Cloud Security

by Threat StackJan 12, 2018

There are many tools and processes for improving security in cloud IT environments, but many enterprise security teams still complain about their lack of "visibility" into the cloud. In this Dark Reading webinar, a top expert offers a look at practices and tools that will help your team monitor security in IT environments that incorporate many cloud applications and services. You'll also get advice on how to evaluate and measure cloud security, and how to work with service providers to improve


Strategies for Using Cyber Threat Intelligence

by DomainToolsJan 08, 2018

Between threat intelligence tools, industry ISACs, and a wide range of other services, IT organizations are flooded with ways to keep up to date on the latest security threats. But without mechanisms in place to actually use the information, these alerts provide little benefit. Learn how your IT organization can develop processes to quickly digest threat data and turn it into real actions, improving response to new threats and increasing overall security.


Frost & Sullivan: What you SIEM is what you get

by AlienVaultJan 05, 2018

Security Information and Event Management (SIEM) is a foundational cyber security technology. However, a properly executed SIEM strategy is difficult to execute even in static network environments with limited assets, much less for companies that have heterogeneous networks, transient end users, and plans of expansion.

In this analyst report from Frost & Sullivan, you'll read about several factors that companies big and small need to consider when purchasing and deploying a SIEM. You'll


Cyber threats are growing at an alarming rate. Get the protection you need to build an effective security strategy.

by GRA QuantumJan 04, 2018

As dependency on digital infrastructures grow, vulnerabilities rise. What do companies stand to lose that don't take proper precautions?


The Future of Cyber Regulation: New York’s Cyber Security Rules for the Finance and Insurance Industry

by GRA QuantumJan 04, 2018

Banks, insurance companies, and other financial services institutions are now required to meet the standards of the 23 NYCRR Part 500 regulations.

Are you keeping up on the evolving NYFS regulations?


SUBTOPICS:

AlienVault

At AlienVault, we believe that open and collaborative is the best way for all companies to gain the security visibility they need. Our Unified Security Management (USM) platform provides a fast and cost-effective way for organizations with limited security staff and budget to address compliance and threat management needs. With all of the essential security controls already built-in, through out of the box integrations with dozens of sophisticated open source security technologies, USM puts enterprise-class security visibility within easy reach of smaller security teams who need to do more with less. AlienVault USM customers include government and educational entities, and enterprises of all sizes around the globe. For more information visit www.alienvault.com, or download the free 30-day trial: www.alienvault.com/free-trial


Anomali

Anomali delivers earlier detection and identification of adversaries in your organizations network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs. Anomali's approach enables detection at every point along the kill chain, making it impossible to mitigate threats before material damage to your organization has occurred.


DomainTools

DomainTools, the recognized leader in domain name research and monitoring tools, offers the most comprehensive searchable database of domain name registration, Whois records and hosting data for online investigations and research. Cyber security analysts, fraud investigators, domain professionals and marketers use DomainTools to investigate cybercrime, protect their assets and monitor online activity. DomainTools has 12 years of history on domain name ownership, Whois records, hosting data, screenshots and other DNS records. That's why customers say, "Every online investigation starts with DomainTools." DomainTools customers include many Fortune 1000 companies, leading vendors in the Security and Threat Intelligence community and most crime-fighting government agencies. Individual users can start with an online Free Trial available at http://www.domaintools.com. Enterprise accounts are available from http://www.domaintools.com/about/contact-us.


F5

F5 makes app go -- faster, smarter, and safer. With solutions for the cloud and the data center, F5 technology provides unparalleled visibility and control, allowing customers to secure their users, applications, and data.


GRA Quantum

GRA Quantum is a pioneering information security firm founded upon the belief that every organization has the right to keep their data private and secure.

Our mission is to build close partnerships with our clients, serving them not as just a vendor, but as trusted advisors helping them to build effective, proactive plans.

Our focus is always on both the technical and human elements within an organization. We believe in comprehensive strategies designed to harden networks, deflect attackers, and rapidly recover from any accidents.

As technology progresses, so too do our tactics, ensuring our experts are always prepared to serve forward-looking leaders eager to stay ahead of emerging threats.


Threat Stack

Headquarters: Boston, MA

Threat Stack provides continuous security monitoring for public, private, and hybrid cloud infrastructures protecting servers, and the data they access, from intrusion and data loss. Built in the cloud, for the cloud, Threat Stack is the first and only intrusion detection and auditing service purpose-built for cloud environments where network-based controls cannot be deployed. Threat Stack is headquartered in Boston, MA. For more information and to start a free trial visit: https://www.threatstack.com


Veriato

Veriato develops intelligent, powerful solutions that provide companies with visibility into, and understanding of, the human behaviors and activities occurring within their firewall, making them more secure and productive. We provide world-class software and support that enables our customers to protect their most valuable assets, reduce their risk, and gain unparalleled visibility into their operations.