Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Security

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







2020: Threats in Review

by DarktraceDec 14, 2020

The sudden and unforeseen transition to remote and hybrid working at the start of 2020 has had profound implications on the cyber-threat landscape. This report explores the key threat trends that emerged as a result: SaaS account takeover Email 'fearware' attacks A resurgence in server-side attacks Continued rise of ransomware Discover eight cyber-attacks that evaded other security tools but were caught in real time by Darktrace AI.


Putting the Secs Into SecDevOps

by VeracodeDec 14, 2020

DevOps practices and technologies have changed the way software is developed, written, and run. But how does your application development team build security into its processes? In this webinar, experts discuss the integration of security and DevOps ? sometimes called SecDevOps or DevSecOps ? and how it can make your applications not only more flexible, but more secure. You?ll also get advice on how to bring your security team and app dev team together through common tools and practices


Improve MITRE ATT&CK Test Results for Endpoint Security Using Deception

by Attivo NetworksJan 13, 2021

As part of its support for ATT&CK®, MITRE recently began evaluating vendor products, as a neutral authority, by testing the ability of specific solutions to detect inbound attacks based on the framework. While MITRE does not rate or recommend tools, the methodology serves as a useful benchmark for comparison. MITRE's evaluation methodology and evaluation results are all publicly available on the MITRE website.

Using this data, Attivo Networks® conducted a study to evaluate


Attivo Networks MITRE Shield Mapping

by Attivo NetworksJan 13, 2021

MITRE has launched a knowledge base named Shield that captures capabilities surrounding Active Defense and adversary engagements. The very first publication of this knowledge base is in the form of a matrix listing capabilities for Active Defense. Shield complements the MITRE ATT&CK knowledgebase (Adversarial Tactics, Techniques, and Common Knowledge), which is a highly-regarded tool in the Threat Intelligence Community for modeling cybersecurity threats. From a defender's perspective, the


Accelerating SolarWinds Incident Response for Rapid Lateral Movement Detection

by Attivo NetworksJan 13, 2021

The SolarWinds breach is a prime example of an ongoing supply chain breach, and one should be aware that this has happened in the past and will happen again. As with any breach, discovering an attacker inside the network is extremely alarming. The focus should be to detect the attacker's attempts to move laterally in the network, evaluate their privileges, minimize their window of opportunity, and shut them out as fast as possible. This latest compromise with SolarWinds has magnified the impact


Attivo Networks in a Zero Trust Architecture

by Attivo NetworksJan 13, 2021

As organizations increasingly move to cloud services, have more work locations, adopt Bring-Your-Own-Devices policies, and deploy Internet of Things (IoT) devices into their networks, their traditional way to protect a network perimeter must change. The castle-and-moat model of hardening network perimeters to prevent a compromise can no longer effectively provide security in a world of increasingly advanced and sophisticated threats. The Zero Trust model of security arose to address these


Calculating ROI for Attivo Deception and Concealment Technology

by Attivo NetworksJan 13, 2021

Today's information security landscape demands a layered defense but justifying the value of any single security control is always a challenge. As security professionals, CFOs, and other vital decision-makers recognize, there is no such thing as a silver bullet or a one-size-fits-all solution.

However, as shown by evaluating the Attivo solutions with the MITRE ATT&CK® and Shield frameworks, there is a demonstrable boost in performance and detection coverage.

Attivo's


Getting Your Security Tech Together: Making Orchestration and Automation Work For Your Enterprise

by CiscoNov 30, 2020

If your IT shop is like most enterprises?, you?ve got a ton of tools and processes ? but no easy way to tie them together and automate them. How can you pull your existing security systems together to improve your data defenses and speed incident response?


The 2020 Duo Security Trusted Access Report

by Duo SecurityJan 07, 2021

Duo Security's annual Trusted Access report focuses on remote access, analyzing findings from 26 million devices, across more than 500,000 applications and over 700 million authentications per month. With more people working from home than ever, organizations across the globe must ask themselves how employees can access all their applications without exposing themselves to risk and ensure that users keep their operating systems and software up to date. The 2020 report addresses these questions


Passwordless: The Future of Authentication

by Duo SecurityJan 07, 2021

Passwordless authentication eliminates reliance on passwords and delivers a host of business benefits, including a better user experience, reduced IT time and costs and a stronger security posture. However, even though digital transformation and the business benefits are prompting a shift towards passwordless authentication, most organizations are not yet in a place where this is easily achievable. Duo Security's latest whitepaper covers the challenges and problems that passwords as a form of


SUBTOPICS:

Attivo Networks

Attivo Networks®, the leader in lateral movement attack detection and privilege escalation prevention, delivers a superior defense for countering threat activity. Through cyber deception and other tactics, the Attivo ThreatDefend® Platform offers a customer-proven, scalable solution for denying, detecting, and derailing attackers and reducing attack surfaces without relying on signatures. The portfolio provides patented innovative defenses at critical points of attack, including at endpoints, in Active Directory, in the cloud, and across the entire network by preventing and misdirecting attack activity. Forensics, automated attack analysis, and third-party integrations streamline incident response. Deception as a defense strategy continues to grow and is an integral part of NIST Special Publications and MITRE® Shield, and its capabilities tightly align to the MITRE ATT&CK® Framework. Attivo has won over 130 awards for its technology innovation and leadership.


Cisco

Cisco (NASDAQ: CSCO) is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. At Cisco customers come first and an integral part of our DNA is creating long-lasting customer partnerships and working with them to identify their needs and provide solutions that support their success.


Darktrace

Darktrace is the world's leading cyber AI company and the creator of Autonomous Response technology. Its self-learning AI is modeled on the human immune system and used by over 3,000 organizations to protect against threats to the cloud, email, IoT, networks and industrial systems.

The company has over 1,000 employees and headquarters in San Francisco and Cambridge, UK. Every 3 seconds, Darktrace AI fights back against a cyber-threat, preventing it from causing damage.


Duo Security

Duo Security, now part of Cisco, is the leading multi-factor authentication (MFA) and and secure access provider. Duo comprises a key pillar of Cisco Secure™s Zero Trust offering, the most comprehensive approach to securing access across IT applications and environments, from any user, device, and location. Duo is a trusted partner to more than 25,000 customers globally, including Bird, Facebook, Lyft, University of Michigan, Yelp, Zillow and more. Founded in Ann Arbor, Michigan, Duo also has offices in Austin, Texas; San Francisco, California; and London. Try it for free at Duo.com


Veracode

Veracode's the only independent provider of cloud-based application intelligence and security verification services. The Veracode platform provides the fastest, most comprehensive solution to improve the security of internally developed, purchased or outsourced software applications and third-party components. By combining patented static, dynamic and manual testing, extensive eLearning capabilities, and advanced application analytics, Veracode enables scalable, policy-driven application risk management programs that help identify and eradicate numerous vulnerabilities by leveraging best-in-class technologies from vulnerability scanning to penetration testing and static code analysis. Veracode delivers unbiased proof of application security to stakeholders across the software supply chain while supporting independent audit and compliance requirements for all applications no matter how they are deployed, via the web, mobile or in the cloud. Veracode works with customers in more than 80 countries worldwide representing Global 2000 brands. For more information, visit www.veracode.com, follow on Twitter