Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

DomainTools

DomainTools, the recognized leader in domain name research and monitoring tools, offers the most comprehensive searchable database of domain name registration, Whois records and hosting data for online investigations and research. Cyber security analysts, fraud investigators, domain professionals and marketers use DomainTools to investigate cybercrime, protect their assets and monitor online activity. DomainTools has 12 years of history on domain name ownership, Whois records, hosting data, screenshots and other DNS records. That's why customers say, "Every online investigation starts with DomainTools." DomainTools customers include many Fortune 1000 companies, leading vendors in the Security and Threat Intelligence community and most crime-fighting government agencies. Individual users can start with an online Free Trial available at http://www.domaintools.com. Enterprise accounts are available from http://www.domaintools.com/about/contact-us.

Our Website: http://www.domaintools.com


Latest Content From DomainTools

Whitepaper: The 2021 Threat Hunting Report

by DomainToolsApr 05, 2021

Threat hunting continues to evolve for organizations that focus on proactively detecting and isolating Advanced Persistent Threats (APTs) that might otherwise go undetected by traditional, reactive security technologies.

While many SOCs are struggling to cope with the current security threat workload, more organizations are adopting threat hunting as part of their security operations. They are discovering that proactive threat hunting can reduce the risk and impact of threats while improving defenses against new attacks.

This survey includes information surrounding:
• Benefits of threat hunting
• The most important skills for threat hunters
• Investments for better threat hunting
• Insights into adversaries


Whitepaper: The Impact of the SolarWinds Breach on Cybersecurity

by DomainToolsApr 05, 2021

The SolarWinds hack has presented a cybersecurity reckoning at a scale never before seen for the US government and private enterprises. While the width and depth of state-sponsored attacks are yet to be determined, one thing is certain: the fallout from the SolarWinds hack is going to get worse before it gets better.

To help determine the impact this breach has had on organizations, Domaintools conducted a survey among security professionals in order to provide the infosec community with insights into the cybersecurity world post-SolarWinds.

Survey highlights and areas of relevance include:
• How organizations handled the hack and how job roles were impacted
• How the priorities of threat hunting and DNS and domain-level intelligence were affected
• What resources have been reallocated and how budgets have shifted
• How organizations are reevaluating risk under the assumption they were compromised
• What process improvements have been made in response to state-sponsored attacks


Research Report: SANS 2021 Cyber Threat Intelligence Survey

by DomainToolsJan 19, 2021

Cyber Threat Intelligence (CTI) is analyzed information about the capabilities, opportunities, and intent of adversaries conducting cyber operations. Adversaries tend to operate in and across digital networks and equipment that shape and impact businesses, critical infrastructure, and our daily lives. Understanding how threats are targeting information, systems, people, and organizations helps organizations and individuals alike understand how to perform threat hunting and security operations, respond to incidents, design better systems, understand risk and impact, make strategic changes and protect themselves from future harm.

Even with the difficulties that 2020 brought, CTI work has continued to grow and mature -- a record number of organizations report that they have clearly communicated intelligence requirements as well as methods and processes in place to measure the effectiveness of CTI programs. These improvements continue to show the resilience of the field and the value of CTI as a resource for clarity and prioritization when complex challenges arise.

This survey also includes information surrounding:
• The value of CTI
• The reversal of recent CTI trends
• How organizations and CTI analysts are adapting to remote work
• Improvements regarding automated tools and processes
• How the CTI field is growing and next steps for the community


Research Report: 2020 Threat Hunting Report

by DomainToolsOct 06, 2020

In 2020, Cybersecurity Insiders conducted the third annual research project on threat hunting to gain deeper insights into the maturity and evolution of the security practice. This Threat Hunting Report is based on the results of a comprehensive online survey of cybersecurity professionals, to gain deep insight into the latest trends, key challenges, and solutions for threat hunting management. The respondents range from technical executives to managers and IT security practitioners, representing a balanced cross-section of organizations of varying sizes across multiple industries.

The research confirms that organizations are increasing their operational maturity and investments in threat hunting. Organizations realize that proactively uncovering security threats pays off with earlier detection, faster response, and effective denial of future exploits that can damage business operations.

This survey also includes information surrounding:

  • Primary goals of an organization's threat hunting programs
  • Threat Hunting Automation
  • Top benefits of threat hunting
  • Threat Hunting as an investment


Whitepaper: Cybersecurity Report Card

by DomainToolsOct 06, 2020

2020 was been a year filled with uncertainty. Many industries were either unprepared or not designed to move to a fully remote work environment with haste. Those on the cyber defense frontlines were faced with new challenges in multiple areas as an increase in cyberattacks coincided with the sudden shift to remote work. The progress made over the previous years towards a more mature security posture equipped many organizations with the skills and tools to meet these challenges head on. As a result, the number of reported breaches this year did not increase, despite the pandemic.

This paper outlines the results of the DomainTools' fourth annual Cybersecurity Report Card Survey. More than 520 security professionals from companies ranging in size, industry, and geography were surveyed about their security posture and asked to grade the overall health of their programs. Almost 60 percent of respondents are on the cyber frontlines as security researchers, analysts or threat hunters. The responses built on the results of the previous 2017, 2018, and 2019 Report Cards. The environment that this year's survey was conducted in differs markedly from previous years due to the upheaval that arose from the global pandemic.

Key findings from this survey include:

  • The growing sophistication of organizations' threat hunting capabilities
  • Important trends in common attack vectors
  • Common traits of grade "A" respondents
  • Keys to success in 2021


Whitepaper: The Value of Threat Intelligence with DomainTools: Identify Threats 82% Faster

by DomainToolsJun 29, 2020

There is an increasing chasm between the number of qualified cybersecurity professionals and the number of people needed to fill those roles. DomainTools is a vendor that seeks to address these challenges by offering context rich threat intelligence solutions. DomainTools offerings involve using indicators, including domains and IP addresses, to develop risk assessments, profile attackers, guide investigations, and map cyber activity to attacker infrastructure.

Download this white paper to learn how DomainTools Threat Intelligence solutions can help empower your security teams to:
• Identify threats 82% faster
• Proactively identify 3x more threats
• Lower chance of incidents by 19%
• Improve productivity for threat investigation teams by 51%


Research Report: 2020 SANS Cyber Threat Intelligence

by DomainToolsApr 06, 2020

Cyber Threat Intelligence (CTI) is analyzed information about the capabilities, opportunities and intent of adversaries that meets a specific requirement determined by a stakeholder. Organizations with CTI programs focus on understanding the threats they face and providing specific information to help defend against those threats. In the past few years, CTI has evolved from small, ad-hoc tasks performed disparately across an organization to, in many cases, robust programs with their own staff, tools and processes that support the entire organization.

2020 was a big year for the SANS CTI Survey, with a record number of respondents and the highest ever reporting of CTI programs within organizations, with 1,006 responding to the survey in 2020 and just 505 responding in 2019. There were some areas that leveled out after years of growth--such as implementation of threat intelligence platforms and a focus on tactics, techniques and procedures (TTPs) over just indicators of compromise (IoCs)--and some areas that continued to grow both in number and variety, such as the types of data being used to generate intelligence. As the field settles into its new maturity, understanding and improving the effectiveness of CTI programs will become even more critical.

This survey also includes information surrounding:
• The value of CTI
• Best practices for defining CTI requirements
• How organizations leverage CTI
• Next steps for the CTI community based on data


Whitepaper: SANS Cyber Threat Intelligence Survey

by DomainToolsJan 08, 2020

Cyber threat intelligence (CTI) analyzes information about the intent, capabilities and opportunities of adversaries in cyberspace, making it a valuable resource for organizations as well as individuals serving in roles such as network architects, security operations team members, incident responders and high-level decision makers, all of whom must be prepared for the wide range of threats challenging their organizations. SANS has been tracking the evolution of CTI as a mechanism for prevention, detection and response through seven CTI summits and five surveys, and has seen a gradual maturation of the field and its applications in information security.

This survey also includes information surrounding:

• The value of CTI
• Best practices for defining CTI requirements
• How organizations leverage CTI


Whitepaper: Powering Incident Response by Operationalizing Threat Intelligence

by DomainToolsJan 08, 2020

Threat intelligence is the pathway that leads us to clear and actionable knowledge about malicious actors. The challenge with threat intelligence, however, is that while security teams have boundless access to both free and paid threat data feeds, they are often overwhelmed with information. The vast amount of data and alerts, combined with the resource shortage most face, makes it difficult to turn the data into intelligence that applies to the organization, and then translate that insight into actions that decrease the attack surface or address real, imminent threats.

More than half of organizations report a problematic shortage of cybersecurity skills. The industry's global skills gap is forecasted to result in a record high of 3.5 million unfilled positions by 2021. Hiring more people is currently not an option for teams who are inundated with security data, alerts and incidents. Rather, practioners need to operationalize threat intelligence, so they are empowered with better, faster, smarter ways to query, learn from and enrich threat data so it can be put into action.

This paper includes information surrounding:

• Situational analysis
• Extracting value from threat intelligence
• A real world look at operationalizing threat intelligence


Whitepaper: The Value of Threat Intelligence

by DomainToolsJan 08, 2020

Is it possible to overcome the daunting challenge of knowing everything that's going on inside and outside the network? Tarik Saleh, Senior Security Engineer at DomainTools believes the answer is yes--if security teams take new approaches to how they think about, vet and validate intelligence, indicators and adversary behaviors.

This paper will discuss detection strategies to reduce false positives, and models that improve threat hunting and investigations outcomes. It will also cover leading tools that help teams make the most of their limited time and resources.

This paper includes information surrounding:

• Types of threat detection
• Strategies to fine-tune threat detection and response
• Tools to support a behavior-led detection strategy