TECH DIGITAL RESOURCE LIBRARY

Insurance

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Managing the Risk of Post-breach or “Resident” Attacks

by Illusive NetworksNov 14, 2018

How well-equipped is your organization to stop insider attacks or external attackers once they're inside your network? According to this study, almost two-thirds of respondents lack efficient capabilities to detect and investigate "stealth" attackers before serious damage occurs.

This report, summarizing insights provided by over 600 IT and IT security professionals, sheds light on:

•The challenge to align security programs with top business risk priorities


The Network of the Future is Powered by AI

by Mist SystemsSep 24, 2018

Artificial intelligence (AI) promises to reshape the way IT organizations deploy and manage infrastructure and how users consume those services. On the networking front, AI allows networks to be more predictive and intelligent, with the ability to automatically make recommendations and implement policies to save time and money and reduce downtime. The IT department at Dartmouth College is on the leading edge of this movement, realizing that students learn best using a network architecture that


Lambda Architecture with In-Memory Technology

by DellSep 21, 2018

Envision a future in which executives have immediate access to streaming data detailing the inner workings of their business, where they can mine large data stores for valuable insights providing a competitive advantage. The path to achieving this vision isn?t always clear, but this webinar series can help.

The time of the traditional data warehouse is coming to an end. Designed to meet business intelligence needs of an earlier era traditional data warehouses can?t handle the


Get Smarter, Be Safer With VirusTotal Enterprise

by VirusTotalOct 24, 2018

VirusTotal Enterprises enables you to research and hunt for malware, to investigate security incidents, to automate analysis, and to keep your investigation private and secure.


Top 5 Log Sources You Should Be Ingesting but Probably Aren’t

by ReliaQuestOct 18, 2018

Logging Tips That Save Money and Enhance Security.


For More Effective Endpoint Security, Improve Your Endpoint Management E-Book

by LogMeInOct 17, 2018

A recent analysis by Aberdeen Group shows that the volume of critical endpoint vulnerabilities, and the percentage of vulnerabilities being exploited have grown significantly in the last two years.


Design Secure Software from the First Line of Code

by WhiteHat SecurityOct 13, 2018

Have you ever discovered flaws in your applications after they've been released to the public? As developers push applications out the door at increasingly faster rates, it's crucial that security vulnerabilities are discovered during the development process. Because by the time security teams uncover these flaws, costs of remediating vulnerabilities skyrocket and development teams are onto the next sprint.

Download this white paper for keen insights into:
• Why security needs to


Securing your Code for GDPR Compliance

by WhiteHat SecurityOct 13, 2018

Writing code for compliance standards is still a young discipline; while PCI DSS has provided directives for applications security testing and check, GDPR has been less specific with its directive that new portals, websites, and applications which touch EU Citizen data be developed according to the principles of Privacy by Design.

What does that mean to the Application and Solution Architect? It means they need to figure out how to secure all future releases of applications, both web and


And Now, a Word from a Hacker

by CylanceOct 09, 2018

Anyone can learn how to be a hacker. It's actually quite simple. And, most modern systems remain defenseless against many basic methodologies. Read this news bite to learn tactics for hacking an Instagram account password.


WannaCry: One Year Later

by AnomaliOct 01, 2018

This white paper analyses the WannaCry ransomware attack that occurred in May 2017. It delves into how things have evolved in the past year to observe whether companies and organizations have modified and changed to address the issues WannaCry highlighted. The report investigates the technical aspects of the attack, the consequences for organizations, and the lessons learned.

Good cybersecurity behaviors like immediately implementing critical patches to systems, utilizing multi-factor


SUBTOPICS:

Anomali

Anomali delivers earlier detection and identification of adversaries in your organizations network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs. Anomali's approach enables detection at every point along the kill chain, making it impossible to mitigate threats before material damage to your organization has occurred.


Cylance

Cylance has redefined endpoint security. Our products and services aim to predict and prevent, rather than reactively detect, the execution of advanced threats. Deployed on over 14.5 million endpoints, we protect clients worldwide including Fortune 100 organizations and governments.


Dell

Dell Inc. (NASDAQ: DELL) listens to customers and delivers innovative technology and services they value. A leading global systems and services company uniquely enabled by its direct business model, Dell is No. 33 on the Fortune 500 list of America's largest companies. For more information, visit www.dell.com or to communicate directly with Dell via a variety of online channels, go to www.dell.com/conversations. To get Dell news direct, visit www.dell.com/RSS.


Illusive Networks

Headquarters: Tel Aviv, Israel

Illusive Networks is a cybersecurity firm headquartered in Tel Aviv, Israel. The company produces technology that deceives cyber attackers by planting false information about given network's resources.


LogMeIn

LogMeIn is a leading provider of on-demand, remote-connectivity and support solutions to small businesses, IT service providers and consumers. Businesses and IT service providers use LogMeIn's solutions to deliver remote end-user support and to access and manage computers and other Internet-enabled devices more effectively and efficiently. Consumers and mobile workers use our solutions to access computer resources remotely, thereby facilitating their mobility and increasing their productivity. Our solutions, which are deployed on-demand and accessible through a Web browser, are secure, scalable and easy for our customers to try, purchase and use. Since our inception, our users have connected over 50 million computers and other Internet-enabled devices to a LogMeIn service.


ReliaQuest

SECURITY IS ALL WE DO. From our earliest days, we've been laser-focused on delivering operational excellence in cybersecurity. No managed services engagements. No consulting models. No value-added products or services. Just a commitment to help Make Security Possible for enterprise leaders looking to unlock the true potential in their data.


VirusTotal

VirusTotal was founded in 2004 as a free service that analyzes files and URLs for viruses, worms, trojans and other kinds of malicious content. Our goal is to make the internet a safer place through collaboration between members of the antivirus industry, researchers and end users of all kinds. Fortune 500 companies, governments and leading security companies are all part of the VirusTotal community, which has grown to over 500,000 registered users.


WhiteHat Security

WhiteHat Security has been in the business of securing web applications for 17 years. Combining advanced technology with the expertise of its global Threat Research Center (TRC) team, WhiteHat delivers application security solutions that reduce risk, reduce cost and accelerate the deployment of secure applications and web sites. The company's flagship product, WhiteHat Sentinel, is a software-as-a-service platform providing dynamic application security testing (DAST), static application security testing (SAST), and mobile application security assessments. The company is headquartered in San Jose, Calif., with regional offices across the U.S. and Europe.