TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

How to Use Artificial Intelligence and Machine Learning to Improve Enterprise Security

by Deep InstinctMar 19, 2019

Many cybersecurity vendors today use terms such as ?AI? and ?machine learning? (ML) to describe the capabilities of their products. But what exactly do these technologies do, and how can you implement them to improve your everyday IT security processes? In this enlightening Dark Reading webinar, a top expert will offer some useful definitions of terms and will discuss some practical applications of the technology that might speed your incident reaction time and improve your use of IT

  • Security Management & Analytics
  • Details

4 Reasons to Add UBA to Your SIEM

by SplunkMar 19, 2019

Download your complimentary copy of "4 Reasons to Add UBA to Your SIEM" and discover why adding a machine-learning UBA solution can prove to be an invaluable addition to your SIEM.

  • Splunk
  • Security
  • Risk Management/Security
  • Details

7 SIEM Trends to Watch in 2019

by SplunkMar 19, 2019

Since the inception of SIEM technology, SIEM solutions have become more of an information platform, with enterprise demands for better security driving the market. Read "7 SIEM Trends to Watch in 2019" to discover the exciting features on the horizon.

  • Splunk
  • Risk Management/Security
  • Security Monitoring
  • Details

Disrupting Lateral Movement

by SecureWorksMar 14, 2019

Attackers don't have to hit your most critical assets directly -they'll find a soft spot in your perimeter defenses and move laterally through your environment until they reach their target. In this webinar you'll learn about the tools and techniques you can use to detect attackers' lateral movement within your computing environment and how to stop them before they launch their final payload.


2019 Ponemon Report: The Value of Threat Intelligence from Anomali

by AnomaliMar 14, 2019

The Ponemon Institute surveyed over 1,000 security professionals in the United States and the United Kingdom

The survey covered a range of threat intelligence topics, participants included in the survey utilize threat intelligence as part of their cybersecurity programs.

Results show that participants strongly believe in the importance and value of threat intelligence data but are struggling to maximize its effectiveness in detecting cyber threats. They call the lack of progress in

  • Anomali
  • Security Monitoring
  • Security Management & Analytics
  • Details

Organizing the Hunt for Cyber Threats with MITRE ATT&CK

by AnomaliMar 14, 2019

The first step to outsmarting your enemies-- think like them

Today's security teams are fully occupied reacting to the volumes of organizational data on potential malicious activity. Responding to a high volume of alarms can leave very little time for strategy or improving the overall security environment.

Organizations are harnessing MITRE ATT&CK to understand their adversaries and strengthen their defenses. The ATT&CK framework structures comprehensive information on attacker

  • Anomali
  • Security Monitoring
  • Risk Management
  • Details

How Speech Analytics, NLP, and Other AI Technology Is Changing the Way We Work

by DialpadMar 13, 2019

The way we work and communicate today is changing. Organizations are rethinking the employee, customer, and sales experience. Forward thinking companies are embracing cloud and AI-powered technologies. Why? Recent technology advancements are enabling new ways to make employees more effective, improve customer engagement, gain competitive insights, and boost sales. Join two of the greatest thought leaders in AI and Unified Communications for an engaging presentation, discussion, and audience Q&A.

  • Artificial Intelligence
  • Unified Communications
  • Communications
  • Customer Experience
  • Details

Gartner Report: Market Guide for Network Traffic Analysis

by ExtraHopMar 12, 2019

Gartner's Neil Macdonald identified Network Traffic Analysis as one of the Top Technologies for Security in 2017. Now, in their inaugural Market Guide for Network Traffic Analysis, Gartner states that:

"To improve the detection of suspicious network traffic, security and risk management leaders should:
• Implement behavioral-based network traffic analysis tools to complement signature-based detection solutions
• Include NTA-as-a-feature solutions in their

  • ExtraHop
  • Security
  • Network & Perimeter Security
  • Details

Overcoming Cyberthreats to Critical Infrastructure with Integrated IT/OT Cybersecurity

by ForeScoutMar 06, 2019

Many organizations reliant on critical infrastructure networks are striving to reduce risk with cybersecurity strategies that bridge both IT and OT asset domains. However, achieving comprehensive IT/OT cybersecurity is often a more challenging task in practice than it is conceptually. Security professionals interested in effectively executing an integrated IT/OT cybersecurity strategy should join this webinar to learn how they can achieve end-to-end visibility into the full spectrum of both IT


EcoStruxure™ IT: Visibility Across Hybrid Ecosystem

by Schneider ElectricMar 01, 2019

Access this interactive tool to learn more about a cloud-based architecture purpose-built for hybrid IT and data center environments.

  • Schneider Electric
  • Data centers
  • Cloud Infrastructure
  • Details