TECH DIGITAL RESOURCE LIBRARY

Government

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Budget and Buy-in: Getting Executives Invested in Cybersecurity

by BarklyJul 30, 2018

Having a hard time getting executive buy-in for cybersecurity? Learn how to make a stronger business case for new tools and additional security budget.


You’re Only as Strong as Your Weakest Third Party

by LookingGlass Cyber Solutions, Inc.Aug 24, 2018

Third party breaches are on the rise and relying on point-in-time assessments won't protect you from tomorrow's breach. Learn how a continuous monitoring program will help your security team monitor, respond, and remedy vendor threats in real-time.


Cybersecurity Beyond the Network Reach

by LookingGlass Cyber Solutions, Inc.Aug 24, 2018

Chris Kissel, Research Director at IDC, discusses the gap in current security postures and how a modern SOC requires a combination of automation and human tradecraft to successfully repel the adversary.


Business Protection Requires a Response to What Lurks Outside Your Walls

by LookingGlass Cyber Solutions, Inc.Aug 24, 2018

Due to the online landscape of misinformation, fake news, and gossip, organizations need to shift their perspectives to threats originating from the external ecosystem. This white paper examines what organizations can do to get in front of a highly untamable environment outside of their network perimeter.


A Guide to Threat Intelligence Selection and Use

by LookingGlass Cyber Solutions, Inc.Aug 24, 2018

When operationalized effectively, high-quality threat intelligence can help differentiate between false positives and true threats. This eBook is a guide to the selection and use of quality, consequential threat intelligence.


2017 Actionable Threat Intelligence Survey

by LookingGlass Cyber Solutions, Inc.Aug 24, 2018

Do you have the policies, personnel, and tools to get the most out of your threat intelligence? This survey reveals the state of threat intelligence in cybersecurity, and how to improve how your organization operationalizes its intelligence.


Endgame Ends Document-Based Phishing

by EndgameJul 30, 2018

According to the 2018 Verizon Data Breach Investigations Report, ?? on average 4% of people in any given phishing campaign will click it...? Successful attacks are inevitable. Just this year we saw cyberattacks on the World Cup, PyeongChang Winter Olympics, financial, chemical and biological threat prevention labs, and Russian election interference. The one thing these all have in common is that they began with email delivered malicious attachments. But phishing is not limited to email and


What Generation is Your Cyber Security?

by Check Point Software Technologies Ltd.Apr 28, 2018

Learn about the evolution of threats from the 1st generation through generation 5 and discover what you must do to prevent today's mega cyber attacks from damaging your IT infrastructure and data.


Cyber Attack Trends 2018 Mid-Year Report

by Check Point Software Technologies Ltd.Aug 15, 2018

Ransomware, last year's breakout attack method, now plays second fiddle to cryptomining malware. Discover which threats are on the uptick and which are declining in this report from Check Point's team of security experts.


10 Emerging Threats Every Enterprise Should Know About

by Dark ReadingAug 13, 2018

This Dark Reading's August Tech Digest explores ten emerging security threats to enterprise data.

IN THIS REPORT: 10 Emerging Threats Every Enterprise Should Know About Trading Platforms Riddled with Severe Flaws Cracking Cortana: The Dangers of Flawed Voice Assistants Demystifying Mental Health in the Infosec Community New Hack Weaponizes the Web Cache The information submitted is collected by both UBM Tech and our sponsors.
UBM Tech's privacy policy.
Cofense


SUBTOPICS:

Barkly

Headquarters: Boston

Protect endpoints the smarter way. Advance your endpoint security with the strongest, smartest protection.


Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. (www.checkpoint.com) is the worldwide leader in securing the Internet. It is the confirmed market leader of both the worldwide VPN and firewall markets. Through its Next Generation product line, the company delivers a broad range of intelligent Perimeter, Internal and Web security solutions that protect business communications and resources for corporate networks and applications, remote employees, branch offices and partner extranets. The company's Zone Labs (www.zonelabs.com) division is one of the most trusted brands in Internet security, creating award-winning endpoint security solutions that protect millions of PCs from hackers, spyware and data theft. Extending the power of the Check Point solution is its Open Platform for Security (OPSEC), the industry's framework and alliance for integration and interoperability with "best-of-breed" solutions from over 350 leading companies. Check Point solutions are sold, integrated and serviced by a network of more than 2,300 Check Point partners in 92 countries.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


LookingGlass Cyber Solutions, Inc.

Headquarters: Arlington County, VA

LookingGlass Cyber Solutions delivers threat protection against cyber 
attacks to global enterprises and government agencies by operationalizing threat intelligence across scalable platforms and network-based threat response products. Our worldwide team of security analysts augment these integrated solutions by enriching our data feeds, reducing false positives, and delivering intelligence and response capabilities.