TECH DIGITAL RESOURCE LIBRARY

Banking

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







The Year in Security 2018

by Dark ReadingDec 06, 2018

This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.

IN THIS REPORT: Meltdown, Spectre Likely Just Scratch the Surface of Microprocessor Vulnerabilities Cyberattack Aimed to Disrupt Opening of Winter Olympics Fileless Attacks Jump 94% in First Half of 2018 Destructive 'VPNFilter' Attack Network Uncovered Schneider Electric: TRITON/TRISIS Attack Used Zero-Day Flaw in its Safety Controller System, and a RAT Memcached


Cybersecurity Insider 2018 Threat Intelligence Report

by AnomaliNov 29, 2018

77% of respondents say that threat intelligence is very to extremely important to their organization's overall security posture.

Threat intelligence has become a significant weapon in the fight against cybersecurity threats, and a large majority of organizations have made it a key part of their security strategies.

Among the key findings of the report are that organizations are leveraging threat intelligence data for a number of use cases, and many rate themselves fairly


NotPetya: One Year Later

by AnomaliNov 28, 2018

This whitepaper examines the NotPetya cyber-attack that occurred in late June 2017. Almost immediately following the WannaCry cyberattack, the NotPetya malware affected countries and organizations around the globe that had strikingly similar repercussions and lessons to take away.

We analyzed how organizations implemented policy or procedural changes, if any, immediately following WannaCry as well as within the past year to improve their resilience to the ever-changing cyber threat


Know Your Unknowns With a Master IP Address List Audit

by QadiumNov 20, 2018

Knowing your network is the most foundational step in building a secure organization, but many organizations overlook important edge cases and even mundane events that lead to an incomplete view of their network. Learn the benefits of using a whole-Internet approach to IP address discovery.


Edge Expander

by QadiumNov 20, 2018

Your unknown Internet assets can devastate your business. Attackers exploit your blind spots and find what you didn't know you had. Expanse Edge Expander provides IT security teams with a continuously updated view of their Internet Edge and its exposures so they can be tracked and remediated to reduce risk, prevent data breaches, and stop ransomware attacks.


Ponemon Study: Managing the Risk of Post-breach or "Resident" Attacks

by Illusive NetworksNov 14, 2018

How well-equipped is your organization to stop insider attacks or external attackers once they're inside your network? According to this study, almost two-thirds of respondents lack efficient capabilities to detect and investigate "stealth" attackers before serious damage occurs.

This report, summarizing insights provided by over 600 IT and IT security professionals, sheds light on:

•The challenge to align security programs with top business risk priorities


Get Smarter, Be Safer With VirusTotal Enterprise

by VirusTotalOct 24, 2018

VirusTotal Enterprises enables you to research and hunt for malware, to investigate security incidents, to automate analysis, and to keep your investigation private and secure.


Top 5 Log Sources You Should Be Ingesting but Probably Aren’t

by ReliaQuestOct 18, 2018

Logging Tips That Save Money and Enhance Security.


For More Effective Endpoint Security, Improve Your Endpoint Management E-Book

by LogMeInOct 17, 2018

A recent analysis by Aberdeen Group shows that the volume of critical endpoint vulnerabilities, and the percentage of vulnerabilities being exploited have grown significantly in the last two years.


Design Secure Software from the First Line of Code

by WhiteHat SecurityOct 13, 2018

Have you ever discovered flaws in your applications after they've been released to the public? As developers push applications out the door at increasingly faster rates, it's crucial that security vulnerabilities are discovered during the development process. Because by the time security teams uncover these flaws, costs of remediating vulnerabilities skyrocket and development teams are onto the next sprint.

Download this white paper for keen insights into:
• Why security needs to


SUBTOPICS:

Anomali

Anomali detects adversaries and tells you who they are. Organizations rely on the Anomali Threat Platform to detect threats, understand the adversary, and respond effectively. Anomali arms security teams with machine learning optimized threat intelligence and identifies hidden threats targeting their environments. Anomali enables organizations to collaborate and share threat information among trusted communities and is the most widely adopted platform for ISACs worldwide.

For more information, visit our website below and follow us on Twitter @Anomali


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


Illusive Networks

Headquarters: Tel Aviv, Israel

Illusive Networks is a cybersecurity firm headquartered in Tel Aviv, Israel. The company produces technology that deceives cyber attackers by planting false information about given network's resources.


LogMeIn

LogMeIn is a leading provider of on-demand, remote-connectivity and support solutions to small businesses, IT service providers and consumers. Businesses and IT service providers use LogMeIn's solutions to deliver remote end-user support and to access and manage computers and other Internet-enabled devices more effectively and efficiently. Consumers and mobile workers use our solutions to access computer resources remotely, thereby facilitating their mobility and increasing their productivity. Our solutions, which are deployed on-demand and accessible through a Web browser, are secure, scalable and easy for our customers to try, purchase and use. Since our inception, our users have connected over 50 million computers and other Internet-enabled devices to a LogMeIn service.


Qadium

Expanse indexes the entire global Internet to define, track, and secure what's yours. This global-scale, real-time approach zeroes-in on your moving pieces and whether or not they're talking to something bad. This big picture approach provides value across the organization and encourages collaboration. That's more than intelligence, it's the smarts that leadership demands.


ReliaQuest

SECURITY IS ALL WE DO. From our earliest days, we've been laser-focused on delivering operational excellence in cybersecurity. No managed services engagements. No consulting models. No value-added products or services. Just a commitment to help Make Security Possible for enterprise leaders looking to unlock the true potential in their data.


VirusTotal

VirusTotal was founded in 2004 as a free service that analyzes files and URLs for viruses, worms, trojans and other kinds of malicious content. Our goal is to make the internet a safer place through collaboration between members of the antivirus industry, researchers and end users of all kinds. Fortune 500 companies, governments and leading security companies are all part of the VirusTotal community, which has grown to over 500,000 registered users.


WhiteHat Security

WhiteHat Security has been in the business of securing web applications for 17 years. Combining advanced technology with the expertise of its global Threat Research Center (TRC) team, WhiteHat delivers application security solutions that reduce risk, reduce cost and accelerate the deployment of secure applications and web sites. The company's flagship product, WhiteHat Sentinel, is a software-as-a-service platform providing dynamic application security testing (DAST), static application security testing (SAST), and mobile application security assessments. The company is headquartered in San Jose, Calif., with regional offices across the U.S. and Europe.