Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Security

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Defending Against Zero-Hour Social Engineering Threats with Modern Threat Intelligence

by SlashNextApr 04, 2019

New kinds of phishing and social engineering tactics and direct-to-browser attack vectors are evading existing multi-level security controls. The introduction of next-gen antivirus technologies is making it harder for bad actors to deliver malware successfully, so they have become more sophisticated in delivering phishing and social engineering attacks. Threat intelligence that covers new types of phishing threats is essential for defending against previously unknown zero hour treats.

In


SlashNext Phishing Survey

by SlashNextApr 04, 2019

Growing Gaps in Protections Against Short-Lived, Yet Dangerous Phishing Threats on the Web

The SlashNext 2018 Phishing Survey suggests a dangerous lack of understanding and gaps in protection against modern, fast-moving phishing attacks. The survey of cybersecurity decision-makers showed that most companies lack adequate safeguards against phishing threats on the web and many don't fully understand the prevalence and risks of this growing threat. As such, most organizations are left in


Real-Time Phishing Threat Intelligence

by SlashNextApr 04, 2019

Through multiple sources, SlashNext proactively inspects millions of suspicious URLs daily. Unlike other anti-phishing technologies, SlashNext patent-pending SEER™ technology uses virtual browsers to dynamically inspect page contents and server behavior to detect tens of thousands of new phishing URLs per day with extreme accuracy. Together with fully automated URL re-checking and retirement, security teams get the most comprehensive, real-time phishing threat intelligence available.


Close Your Phishing Defense Gaps

by SlashNextSep 11, 2019

Despite multi-layer security controls and employee cyber awareness training, phishing and social engineering threats are still bypassing cyber defenses. Remote employees and BYOD users are often operating outside of network perimeter exposing users to more phishing threats from more attack vectors and teams are overwhelmed researching potentially malicious phishing URLs.

Close your phishing defense gaps by addressing three critical challenges.
• Operationalize real-time


Euronext Enhances Security Testing with Cymulate Breach & Attack Simulation

by CymulateSep 10, 2019

Learn why the leading European stock exchange's SOC Manager chose Cymulate Breach and Attack Simulation to accelerate security testing against the latest threats.

By deploying the SaaS-based platform, the Information Security Department reaped immediate benefits, including the ability to: Ascertain security posture following changes in the IT environment Automate attack simulations against the very latest threats Prove effective security spending with KPI metrics Harmonize


Testing Security Effectiveness with the MITRE ATT&CK™ Framework

by CymulateAug 08, 2019

The MITRE ATT&CK framework has been gaining traction globally thanks to its comprehensive mapping of adversary tactics and techniques used to infiltrate a network, compromise systems and act on malicious threat actor objectives.

Security analysts, researchers and incident response teams can leverage the tactics enumerated by the framework to test the effectiveness of their security controls, and validate that they are operating as expected. In this solution brief, learn how Cymulate


Considerations for Choosing an ATO (Account Takeover) Security Solution

by SpyCloudSep 05, 2019

Account takeover (ATO) isn't slowing down. According to the 2019 Verizon Breach Report, 80% of hacking-related breaches involve the use of weak and stolen credentials. To protect your organization, you need to choose an ATO solution that incorporates multiple modes of defense. In this guide, we share best practices and guidelines for evaluating potential solutions.


Understanding the Underground Market for Stolen Credentials

by SpyCloudSep 05, 2019

Even after the fall of the large darknet markets, a sophisticated underground ecosystem still thrives on the sale and trade of stolen credentials. Phishing and spear-phishing attacks are becoming increasingly complex—and that's just the tip of the iceberg. In this white paper, SpyCloud experts provide an in-depth analysis of how underground markets operate, how they are changing, and how you can protect yourself and your company.


Understanding the Latest NIST Password Guidelines

by SpyCloudSep 05, 2019

Over the years, security professionals have learned surprising lessons about how password policies affect user behavior. Faced with complex requirements, people often take dangerous shortcuts.

To help organizations mitigate the risk posed by users' bad password habits, the National Institute of Standards and Technology (NIST) designed a set of password guidelines with human behavior in mind. Read this white paper from SpyCloud to understand what NIST's guidance means for your


Password Remediation Playbook

by SpyCloudSep 05, 2019

What should you do if your employee's password is exposed in a breach? If you're in this position, you need to take action right away to protect your enterprise. Criminals actively exploit stolen login information to take over accounts, drain funds, and infiltrate corporate networks. In this guide, learn the 5 steps you should take to remediate an exposed account.


SUBTOPICS:

Cymulate

With a Research Lab that keeps abreast of the very latest threats, Cymulate proactively challenges security controls against the full attack kill chain, allowing hyper-connected organizations to avert damage and stay safe. Cymulate's SaaS-based breach and attack simulation platform makes it simple to test, measure and optimize the effectiveness of your security controls any time, all the time. By mimicking the myriad of strategies and tools attackers deploy, businesses can assess their true preparedness to handle cybersecurity threats effectively.

Cymulate is trusted by companies worldwide, from small businesses to large enterprises, including leading banks and financial services. They share our vision-to make it easy for anyone to protect their company with the highest levels of security. Because the easier cybersecurity is, the more secure your company—and every company—will be.


SlashNext

SlashNext is transforming how organizations protect themselves from next-gen phishing and social engineering threats. Founded by Atif Mushtaq, the former lead architect of FireEye's core malware detection system, SlashNext has pioneered the industry's most powerful and most accurate phishing site detection technology. SlashNext enables enterprises to close the gaps in their anti-phishing defenses and to automate analysis of suspicious URLs to expedite threat hunting and phishing incident response. With SlashNext, enterprises can dramatically reduce the risk of business email compromise (BEC), credential stealing, IP theft, breaches, and costly remediation efforts.


SpyCloud

SpyCloud is the leader in account takeover (ATO) prevention, protecting billions of consumer and employee accounts either directly or through product integrations. Our award-winning solutions proactively defeat fraud attempts and disrupt the criminals' ability to profit from stolen information.