TECH DIGITAL RESOURCE LIBRARY

Government

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:






Dark Reading Tech Digest: Cybersecurity Threats

by Dark ReadingDec 07, 2016

In this special digital edition of Dark Reading, we cover how business executives should plan for and respond to cybersecurity threats. This issue includes: Five Things Every Business Executive Should Know About Cybersecurity Why Poor Cyber Hygiene Invites Risk The 4 Biggest Mistakes Businesses Make Trying to Secure Endpoints Improving the Security Conversation for CIOs, CISOs, and Board Members Download the issue today!

The information submitted is collected by both UBM and our


Healthcare Ransomware: Hospitals On Hold

by Kaspersky LabNov 17, 2016

Hospital operations coming to a grinding halt. Patients being admitted by handwritten records. And a mysterious message explaining that the only way to get things back up and running is to pay a ransom. It's a scenario that is all too familiar to many hospitals around the country, and it's only getting worse as cybercriminals realize how easily they can penetrate the weak security at many hospitals.

How does a healthcare organization protect itself and keep operations running


The Dangers Of Phishing: Help Employees Avoid The Lure Of Cybercrime

by Kaspersky LabNov 17, 2016

Phishing, which targets employees through fraudulent emails with the intent of getting at sensitive corporate data, is one of the biggest threats to corporate IT security. In fact, Kaspersky Lab's own research shows that in the aftermath of a phishing attack, professional services are usually required to restore normal service, leading to costly budget overruns.Phishing, which targets employees through fraudulent emails with the intent of getting at sensitive corporate data, is one of the


Cybercriminals: Unmasking The Villain

by Kaspersky LabNov 17, 2016

With all of the overwhelming statistics on cybercrime, it can be easy to forget that there are actual people behind these facts and figures.

Have you ever wondered who they are? What countries they come from? Who are their top targets?

As a leader in cybercrime analysis, Kaspersky Lab's GReAT (Global Research and Analysis) team has the answers to your questions in our new eBook, Cybercriminals: Unmasking the Villain, where you can find out such fascinating facts about the


Shooting the Messenger: Understanding the Threats to the Media and Broadcasting Industry

by Digital ShadowsNov 16, 2016

Amid all of the noise, it's often tricky for organizations to identify and prioritize the threats they face online. Organizations in the media and broadcasting industry are no exception.

This paper explores:
- Trends in the threats seen in 2016 for broadcasting and media organizations
- The steps that can be taken to prevent and mitigate potential threats


Four Strategies to Reduce Your Open Source Risk

by Rogue Wave SoftwareNov 19, 2014

Try to think of a single system in the world that hasn't been touched by open source software. Whether included in the product or as part of the development environment, open source plays a dominant role in the success of software development teams everywhere. It's not surprising that every developer has their favorite open source tool to solve particular problems because they understand the substantial time and cost savings when reusing code built by an expert code they don't have to worry


Defense Strategies for the Growing Threat of Ransomware

by ibossNov 04, 2016

Ransomware exploits are pervasive and continue to threaten organizations in every industry. A recent study found that globally, 50% of companies have incurred ransomware attacks. This e-book explains how ransomware works and why it has been so successful. It also offers practical steps you can take to ensure your organization doesn't become ransomware's next victim. Read this e-book and change your approach to defending against elusive ransomware attacks.


The End Game: Exploiting Attacker Weak Spots with TTP-based Detection

by cybereasonNov 02, 2016

Indicators of compromise (IOCs) are a losing battle for security teams as they are easily changed by the attackers. Adopting a detection strategy based on Tactics, Techniques, and Procedures (TTPs) returns power to the defender.

What you will learn:

- Why IOC-based detection is no longer effective and the benefits of a TTP-based
- How Attackers easily change IOC artifacts but lack the time and effort to modify their core tools and techniques
- How a large


The Incident Response Success Checklist

by cybereasonNov 02, 2016

Details matter when developing an incident response (IR) plan. But, even the most successful IR plans can lack critical steps, impeding how quickly normal business operations are restored.
In this eBook you will learn:
- The nine important steps you should incorporate into your Incident Response plan
- How to incorporate these steps into your organization's routine
- How to measure your improvement


Software Vendor Avoids Hiring an Expensive Incident Response Firm

by cybereasonNov 02, 2016

When a government agency tells a company it's the likely target of a cyber attack, the organization's security team takes the warning seriously. But what if the warning was false?

In this case study you will learn:
- How the company's security team used Cybereason to answer the question "Are we under attack?"
- How the organization avoided hiring an expensive incident response firm by using Cybereason.
- How Cybereason constructs a complete attack story.


SUBTOPICS:

cybereason

Founded by elite Israeli-Intel cybersecurity experts, Cybereason is an endpoint detection and response platform, deploying a user-level easy to deploy, frictionless endpoint silent sensor and deploying an analytical engine to detect even faint evidence of malicious activity. Cybereason reconstructs evidence into a clear image of a cyberattack in context. This enables enterprises to discover sophisticated targeted threats at a very early stage, and effectively respond to them, reducing the costs and damages caused by such attacks.

Cybereason is headquartered in Boston, MA with offices in Tel Aviv, Israel.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


Digital Shadows

Digital Shadows provides cyber situational awareness to help organizations protect against cyber attacks, loss of intellectual property, and loss of brand and reputational integrity. We are jointly headquartered in London and San Francisco. Digital Shadows helps large multi-national organizations in sectors including finance, retail, pharmaceuticals and oil and gas. Our flagship solution, Digital Shadows SearchLight,is a scalable and easy-to-use data analysis platform that provides a complete view of an organization's digital footprint and the profile of its attackers. SearchLight is complemented with support from our world-class intelligence operations team to ensure extensive coverage, tailored intelligence and frictionless deployment. Digital Shadows helps our customers see their organizations through an "attacker's eye view" and keep their assets and reputation intact.


iboss

Since its inception, iboss has challenged the status quo in enterprise security, launching innovative, patented technology delivered direct-to-cloud via proprietary node-based cloud container architecture. iboss advanced threat defense features gives security professionals visibility into previously hidden communication channels, and the security tools needed to close the critical data protection gap that can leave even the largest networks vulnerable.


Rogue Wave Software

Rogue Wave Software, Inc. is the leading provider of enterprise class C++ components and infrastructure that enable organizations to build and deploy high performance applications. Only Rogue Wave provides the most complete C++ technology stack including C++ components, UI components, run-time infrastructure, and services. Today, thousands of organizations worldwide have chosen Rogue Wave.