UBM: TECH DIGITAL RESOURCE LIBRARY

Government

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:






Combating Advanced Cyber Attacks with Adversary and Threat Intelligence

by SymantecAug 11, 2015

The threat environment has become increasingly hostile to enterprises. The volume of attacks has grown dramatically, along with the sophistication of attackers. At the same time the potentially enormous consequences of a single successful targeted attack have become evident.

Leading industry analysts are suggesting enterprises leverage adversary and threat intelligence in order to more effectively identify, prioritize and protect against key threats to their unique environment. In this


Cybersecurity Dossier - a post malware age reality

by Bay DynamicsAug 03, 2015

Cyber attackers are not just sharing and leveraging successful data breach methods, but also exfiltrated data feeds. The result - a Cybersecurity Dossier that includes user credentials, exploitable high value systems and applications, vendor credentials and exploitable vendor assets. This infographic outlines how the dossier and the voluminous data it contains is being used drive major cyberattacks and the new realities of the post malware age.


Supercharge Your SIEM: How Domain Intel Enhances Situational Awareness

by DomainToolsJun 10, 2015

Read this white paper to learn what your SIEM isn't telling you, the importance of building a complete picture of the attack, and how to get better insight with better data.


Dark Web Situational Awareness Report

by SurfWatch LabsJul 28, 2015

What does the Dark Web know about my company or my customers?


Best Practices and Success Stories for User Behavior Analytics

by Bay DynamicsJul 17, 2015

Large enterprises are using User Behavior Analytics (UBA) to detect breaches before significant damage occurs. Companies are also using UBA to prioritize alerts, as well as to reduce the volume of alerts and the time it takes to investigate them. This Gartner report outlines best practices and case studies to help navigate the UBA space.


Market Guide for User Behavior Analytics

by Bay DynamicsJul 17, 2015

User behavior analytics helps enterprises detect insider threats, targeted attacks and financial fraud. Security and fraud managers should use this Gartner Market Guide to understand the capabilities vendors must have to provide strong results.


Instilling Confidence in Security and Risk Operations with Behavioral Analytics and Contextualization

by Bay DynamicsJul 17, 2015

Big Data Analytics is a very hot topic in IT Security circles lately. However Big Data by itself is not the panacea for all security ills that most believe it to be. This paper outlines how automated machine learning analytics with contextualization leads to better results and quickly identifies and repels attacks over approaches focused on Big Data.


Hackers Expose Half of FT 500 Europe

by Recorded FutureJun 02, 2015

The frequency of corporate data breaches is increasing, with many of the attacks beginning when employees inadvertently disclose sensitive information. This method is commonly referred to as spear phishing.

Recorded Future analysis identified recent employee credential exposures for at least 49% of the FT 500 Europe, putting each company at risk for a cyber attack.

Download this threat intelligence report and learn: How Recorded Future identified these exposed


50 Shades of Dark

by Recorded FutureJun 01, 2015

There is a lot of talk about the Dark Web these days, including how cyber criminals use it to spread malware, leak intellectual property, and publish user account credentials.

Using open source intelligence (OSINT), our team explored the Surface, Deep, and Dark parts of the Web and investigated the links between them.

Download this white paper to learn: What the Dark, Deep, and Surface Web really are and why your information security team should care. How stolen


Anticipating Cyber Attacks

by Recorded FutureJun 01, 2015

Advanced cyber attackers are winning the race against defenders. To regain the lead, organizations must forecast attacks before they are impacted.

Anticipating cyber attacks allows you to proactively defend your organization rather than perform expensive and reactive incident response, which can include everything from deep forensics to throwing out millions of dollars worth of security infrastructure. And not to mention massive reputation repair campaigns.

This white


SUBTOPICS:

Bay Dynamics

Headquarters: San Francisco

Bay Dynamics is the market leader in cyber risk predictive analytics providing actionable visibility into organizations' cybersecurity blind spots, complete with business risks and threats. The company's purpose--built Risk Fabric platform assembles and correlates relevant data from existing tools in a novel patented way to provide actionable cyber risk insights, before it's too late. Bay Dynamics enables some of the world's largest organizations to understand the state of their cybersecurity posture, including contextual awareness of what their insiders and vendors are doing, which is key to effective cyber risk management. For more information, please visit www.baydynamics.com.

Contact Us


DomainTools

DomainTools, the recognized leader in domain name research and monitoring tools, offers the most comprehensive searchable database of domain name registration, Whois records and hosting data for online investigations and research. Cyber security analysts, fraud investigators, domain professionals and marketers use DomainTools to investigate cybercrime, protect their assets and monitor online activity. DomainTools has 12 years of history on domain name ownership, Whois records, hosting data, screenshots and other DNS records. That's why customers say, "Every online investigation starts with DomainTools." DomainTools customers include many Fortune 1000 companies, leading vendors in the Security and Threat Intelligence community and most crime-fighting government agencies. Individual users can start with an online Free Trial available at http://www.domaintools.com. Enterprise accounts are available from http://www.domaintools.com/about/contact-us.


Recorded Future

We arm you with real-time threat intelligence so you can proactively defend your organization against cyber attacks. With billions of indexed facts, and more added every day, our patented Web Intelligence Engine continuously analyzes the open Web to give you unmatched insight into emerging threats. Recorded Future helps protect four of the top five companies in the world.


SurfWatch Labs

SurfWatch Labs delivers cyber risk intelligence solutions that help organizations understand the potential for cyber-attacks, determine the impact to their business and proactively address threats head on. SurfWatch Labs was formed in 2013 by former US Government intelligence analysts to go beyond the low-level threat intelligence approach that can drown organizations in data. By aggregating and automatically analyzing vast amounts of data from a wide range of structured and unstructured sources, SurfWatch enables organizations to zero in on their unique cyber risk profile and ensure the most effective risk management strategies are identified and implemented. With SurfWatch, organizations can immediately understand and act on their cyber risk. SurfWatch Labs: Cyber In Sight. For more information, visit www.surfwatchlabs.com.


Symantec

Symantec helps consumers and organizations secure and manage their information-driven world.