Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...


Cybersecurity Dossier - a post malware age reality

by Bay DynamicsAug 03, 2015

Cyber attackers are not just sharing and leveraging successful data breach methods, but also exfiltrated data feeds. The result - a Cybersecurity Dossier that includes user credentials, exploitable high value systems and applications, vendor credentials and exploitable vendor assets. This infographic outlines how the dossier and the voluminous data it contains is being used drive major cyberattacks and the new realities of the post malware age.

The Data Loss Prevention Market by the Numbers

by Digital GuardianAug 03, 2015

451 Research has just released their in depth analysis of the Data Loss Prevention (DLP) market. In light of recent high profile data breaches, protection of sensitive financial data and valuable intellectual property requires a more comprehensive data security strategy. As a result, DLP is back in vogue.

There is a market resurgence in DLP that is expected to continue to grow each year. Rather than viewing DLP as a standalone product, this report's studies show that DLP is quickly

Supercharge Your SIEM: How Domain Intel Enhances Situational Awareness

by DomainToolsJun 10, 2015

Read this white paper to learn what your SIEM isn't telling you, the importance of building a complete picture of the attack, and how to get better insight with better data.

Use Actionable Threat Intelligence To Protect Your Business

by SymantecJul 30, 2015

Threat intelligence is one of the most over-hyped capabilities within information security today. Ask five different security vendors what actionable threat intelligence means and you will undoubtedly receive five different responses. With every security vendor marketing and espousing the virtues of their approach to actionable intelligence, security and risk (S&R) leaders need a way to differentiate and dedicate their limited resources to the most beneficial intelligence sources.


Dark Web Situational Awareness Report

by SurfWatch LabsJul 28, 2015

What does the Dark Web know about my company or my customers?

Advanced Analytics For Real-Time Incident Response

by RaytheonJul 22, 2015

In this e-book, Dr. Jones investigates three well-known breaches and takes us through the likely experiences of the security analysts at the time of each breach. He later shows us how these breaches could have been handled should the analysts have had the power of investigative analytics supporting their Incident Response objectives. Dr. Jones believes that effective cyber security is not about preventing all possible attacks, but rather, it's about mitigating damage when attacks do occur.

Just Add Intelligence: Building Knowledge, Experience, and Expertise into Cybersecurity Incident Response

by NuixJul 21, 2015

The faster cybersecurity investigators can identify and contain data breaches, the less cost and damage their organization will suffer. Actionable intelligence allows investigators to spend less time searching and more on analysis and solving problems. But where does this intelligence come from?

An important aspect of intelligence for investigators is knowing where to look and which questions to ask, based on expertise and experience. However, there are only so many practitioners in

Protecting Critical-Value Data from the Inside: Designing and Implementing an Insider Threat Program

by NuixJul 21, 2015

More than one-third of all cybercrime incidents and security breaches are caused by insiders. These insiders have many motivations--financial, political, or even emotional--but the common factor is they all inappropriately access an organization's critical-value data.

While governments around the world have communicated the importance of addressing insider threats, real-world efforts have been patchy. It is easy to understand why some organizations have avoided the issue; the

4 Rules for Minimizing the Potential for Data Breaches

by NuixJul 21, 2015

The high value and easy marketability of private data such as credit cards have made all organizations that store customer information a target for cybercrime. There is also growing evidence of widespread cyber-espionage targeting valuable intellectual property. The costs of a single high-profile data breach can reach many millions of dollars.

And now for the bad news: Breaches are inevitable. Security researchers believe determined attackers can infiltrate any perimeter security

Best Practices and Success Stories for User Behavior Analytics

by Bay DynamicsJul 17, 2015

Large enterprises are using User Behavior Analytics (UBA) to detect breaches before significant damage occurs. Companies are also using UBA to prioritize alerts, as well as to reduce the volume of alerts and the time it takes to investigate them. This Gartner report outlines best practices and case studies to help navigate the UBA space.


Bay Dynamics

Headquarters: San Francisco

Bay Dynamics is the market leader in cyber risk predictive analytics providing actionable visibility into organizations' cybersecurity blind spots, complete with business risks and threats. The company's purpose--built Risk Fabric platform assembles and correlates relevant data from existing tools in a novel patented way to provide actionable cyber risk insights, before it's too late. Bay Dynamics enables some of the world's largest organizations to understand the state of their cybersecurity posture, including contextual awareness of what their insiders and vendors are doing, which is key to effective cyber risk management. For more information, please visit www.baydynamics.com.

Contact Us

Digital Guardian

At Digital Guardian, we believe your data is your business. We protect your company's sensitive information like it's our own so you can minimize risk without diminishing returns. For over 10 years we've enabled data-rich organizations to prevent data loss by securing their endpoint devices. Digital Guardian is security's most technologically advanced endpoint agent providing transformative data visibility and control where you're most vulnerable. The only patented data protection platform trusted on millions of endpoints to secure against insider and outsider threats.


DomainTools, the recognized leader in domain name research and monitoring tools, offers the most comprehensive searchable database of domain name registration, Whois records and hosting data for online investigations and research. Cyber security analysts, fraud investigators, domain professionals and marketers use DomainTools to investigate cybercrime, protect their assets and monitor online activity. DomainTools has 12 years of history on domain name ownership, Whois records, hosting data, screenshots and other DNS records. That's why customers say, "Every online investigation starts with DomainTools." DomainTools customers include many Fortune 1000 companies, leading vendors in the Security and Threat Intelligence community and most crime-fighting government agencies. Individual users can start with an online Free Trial available at http://www.domaintools.com. Enterprise accounts are available from http://www.domaintools.com/about/contact-us.


Nuix protects, informs, and empowers society in the knowledge age. Leading organizations around the world turn to Nuix when they need fast, accurate answers for investigation, cybersecurity incident response, insider threats, litigation, regulation, privacy, risk management, and other essential challenges.


Raytheon Company is a technology and innovation leader specializing in defense, civil government and cybersecurity markets throughout the world. With a history of innovation spanning 92 years, Raytheon provides state-of-the-art electronics, mission systems integration and other capabilities in the areas of sensing; effects; and command, control, communications and intelligence systems; as well as a broad range of mission support services.

SurfWatch Labs

SurfWatch Labs delivers cyber risk intelligence solutions that help organizations understand the potential for cyber-attacks, determine the impact to their business and proactively address threats head on. SurfWatch Labs was formed in 2013 by former US Government intelligence analysts to go beyond the low-level threat intelligence approach that can drown organizations in data. By aggregating and automatically analyzing vast amounts of data from a wide range of structured and unstructured sources, SurfWatch enables organizations to zero in on their unique cyber risk profile and ensure the most effective risk management strategies are identified and implemented. With SurfWatch, organizations can immediately understand and act on their cyber risk. SurfWatch Labs: Cyber In Sight. For more information, visit www.surfwatchlabs.com.


Symantec helps consumers and organizations secure and manage their information-driven world.