TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Why InfoSec Needs to Care About Social Media

by ZeroFOXSep 30, 2016

With the rise of social media, the lines between infosec, marketing, finance, and other departments have been blurred. Several questions arise: how should departments work cross-functionally to address problems? Which issues impact different departments? Who owns the initiative of identifying and remediating social media risks?

  • ZeroFOX
  • Cybersecurity
  • Risk Management/Security
  • Details

The Comprehensive Guide to Social Media Privacy

by ZeroFOXSep 30, 2016

Users and businesses ought to appreciate the scale of the risk that social media poses and take action to help secure online identities. After all, the potential consequences are serious: users accounts can be hijacked to spread malicious links or spam, fraudulent connections can lead to debilitating social engineering attacks, and private information can accidentally be shared publicly. This comprehensive guide contains a walk-through of how to harden the privacy settings of your accounts and

  • ZeroFOX
  • Cybersecurity
  • Endpoint Security
  • Details

Behind Frenemy Lines: Emerging Threats to Business that Leverage Social Media

by ZeroFOXSep 30, 2016

This report by?the 2112 Strategy Group dives into the dangers associated with the growing social media landscape. As social media becomes a staple of many corporations communication, it has also led to a new avenue for cyber criminals to exploit. Covering topics from hashtag hijacking to fraud, this report sheds light on the next big cybersecurity threat: social media.

  • ZeroFOX
  • Risk Management/Security
  • Security
  • Details

Post Grams Not Scams: Detecting Money Flipping Scams on Instagram Using Machine Learning

by ZeroFOXSep 30, 2016

The rise of social networking has created an unprecedented platform for the average Joe to engage and interact on a global scale. There is, unfortunately, a darker side to this evolution. The ZeroFOX Research Team has put the spotlight on the massive underground world of scammers targeting major financial institutions and their customers across Instagram. The scams, called money flipping scams, extort victims into sending money or disclosing banking information. Get an exclusive look at how

  • ZeroFOX
  • Risk Management/Security
  • Big Data
  • Details

The 2016 Gartner Magic Quadrant for Web Content Management

by AcquiaSep 29, 2016

Digital is fundamentally changing the way organizations interact and engage with their customers. The 2016 Gartner Magic Quadrant for Web Content Management (WCM) states that "the democratization of [WCM] capabilities has provided greater agility for marketers and enabled WCM to be formally regarded as key to delivering engaging digital experiences to multiple audiences."

Gartner has named Acquia a Leader for the third consecutive year. Acquia enables organizations to offer

  • Acquia
  • Digital Business
  • Executive Insights & Innovation
  • Details

Darktrace Antigena: The Machine Fights Back

by DarktraceSep 29, 2016

Today's threats are moving faster than ever, with automated attacks deployed that are impossible to keep up with manually. But with advances in machine learning, self-defending networks are no longer a thing of the future. Learn in this data sheet how Darktrace's automatic response technology, Antigena, 'fights back' in real time against cyber-threats, helping security teams to buy back time.

  • Darktrace
  • Cybersecurity
  • Security platforms
  • Details

Detecting the Threat Within: The Real Challenge of Insider Threat

by DarktraceSep 29, 2016

Insider threat is still a major concern - and a number one cause for threat incidents. This white paper explains why training and best practice is not always good enough in an age of interconnected businesses, sophisticated threats and porous network boundaries. Learn why a new approach is required to understand what is going on inside your organization and spot insider incidents - whether malicious or non-malicious.

  • Darktrace
  • Cybersecurity
  • Security Monitoring
  • Details

Darktrace Discoveries: Global Threat Case Studies 2016

by DarktraceSep 29, 2016

Six 2016 real-world case studies are described, where threat scenarios have been uncovered using Enterprise Immune System technology - from IOT hacks to insider incidents. This report describes the abnormal behavior Darktrace found in each case study - which went unnoticed by legacy security tools - and how the threat was able to be mitigated at an early stage.

  • Darktrace
  • Cybersecurity
  • Security
  • Details

Machine Learning: A Higher Level of Automation

by DarktraceSep 29, 2016

Machine learning has become a buzzword in the industry - but in reality, it is hard to get it working properly, at scale. This white paper discusses why automation is critical to the new phase in cyber defense, and how unsupervised machine learning is transforming the challenge of detecting subtle signs of compromise. Learn how Darktrace's unsupervised machine learning filters out the noise of busy and complex networks, helping security teams focus on genuine threats.

  • Darktrace
  • Cybersecurity
  • Security
  • Details

Nothing Kills Attacks Earlier Than DNS-Layer Network Security

by OpenDNSSep 29, 2016

Similar to Amazon learning from shopping patterns to suggest the next purchase, or Pandora learning from music listening patterns to play the next song, OpenDNS learns from Internet activity patterns to identify attacker infrastructure being staged for the next threat.

  • OpenDNS
  • Network & Perimeter Security
  • Security Monitoring
  • Details