TECH DIGITAL RESOURCE LIBRARY

Government

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Beginner's Guide to Ransomware Prevention & Detection

by AlienVaultOct 13, 2017

If you haven't had first-hand experience with ransomware in the past, chances are you've heard of one of the many ransomware attacks that have recently caught worldwide attention. According to a June 2016 survey from Osterman Research, nearly one in two participants indicated that their organization suffered at least one ransomware attack in the last year.

In this whitepaper, we'll cover ransomware basics and provide best practices for ransomware prevention and detection.


19 Minutes: A Minute-by-Minute Account of Collective Defense in Action

by CofenseSep 23, 2018

Employees received an email appearing to come from their CEO that bypassed all their other technology. See how this company analyzed, responded to, and resolved the attack - in less?than 20 minutes.


Budget and Buy-in: Getting Executives Invested in Cybersecurity

by BarklyJul 30, 2018

Having a hard time getting executive buy-in for cybersecurity? Learn how to make a stronger business case for new tools and additional security budget.


You’re Only as Strong as Your Weakest Third Party

by LookingGlass Cyber Solutions, Inc.Aug 24, 2018

Third party breaches are on the rise and relying on point-in-time assessments won't protect you from tomorrow's breach. Learn how a continuous monitoring program will help your security team monitor, respond, and remedy vendor threats in real-time.


Cybersecurity Beyond the Network Reach

by LookingGlass Cyber Solutions, Inc.Aug 24, 2018

Chris Kissel, Research Director at IDC, discusses the gap in current security postures and how a modern SOC requires a combination of automation and human tradecraft to successfully repel the adversary.


Business Protection Requires a Response to What Lurks Outside Your Walls

by LookingGlass Cyber Solutions, Inc.Aug 24, 2018

Due to the online landscape of misinformation, fake news, and gossip, organizations need to shift their perspectives to threats originating from the external ecosystem. This white paper examines what organizations can do to get in front of a highly untamable environment outside of their network perimeter.


A Guide to Threat Intelligence Selection and Use

by LookingGlass Cyber Solutions, Inc.Aug 24, 2018

When operationalized effectively, high-quality threat intelligence can help differentiate between false positives and true threats. This eBook is a guide to the selection and use of quality, consequential threat intelligence.


2017 Actionable Threat Intelligence Survey

by LookingGlass Cyber Solutions, Inc.Aug 24, 2018

Do you have the policies, personnel, and tools to get the most out of your threat intelligence? This survey reveals the state of threat intelligence in cybersecurity, and how to improve how your organization operationalizes its intelligence.


Endgame Ends Document-Based Phishing

by EndgameJul 30, 2018

According to the 2018 Verizon Data Breach Investigations Report, ?? on average 4% of people in any given phishing campaign will click it...? Successful attacks are inevitable. Just this year we saw cyberattacks on the World Cup, PyeongChang Winter Olympics, financial, chemical and biological threat prevention labs, and Russian election interference. The one thing these all have in common is that they began with email delivered malicious attachments. But phishing is not limited to email and


What Generation is Your Cyber Security?

by Check Point Software Technologies Ltd.Apr 28, 2018

Learn about the evolution of threats from the 1st generation through generation 5 and discover what you must do to prevent today's mega cyber attacks from damaging your IT infrastructure and data.


SUBTOPICS:

AlienVault

At AlienVault, we believe that open and collaborative is the best way for all companies to gain the security visibility they need. Our Unified Security Management (USM) platform provides a fast and cost-effective way for organizations with limited security staff and budget to address compliance and threat management needs. With all of the essential security controls already built-in, through out of the box integrations with dozens of sophisticated open source security technologies, USM puts enterprise-class security visibility within easy reach of smaller security teams who need to do more with less. AlienVault USM customers include government and educational entities, and enterprises of all sizes around the globe. For more information visit www.alienvault.com, or download the free 30-day trial: www.alienvault.com/free-trial


Barkly

Headquarters: Boston

Protect endpoints the smarter way. Advance your endpoint security with the strongest, smartest protection.


Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. (www.checkpoint.com) is the worldwide leader in securing the Internet. It is the confirmed market leader of both the worldwide VPN and firewall markets. Through its Next Generation product line, the company delivers a broad range of intelligent Perimeter, Internal and Web security solutions that protect business communications and resources for corporate networks and applications, remote employees, branch offices and partner extranets. The company's Zone Labs (www.zonelabs.com) division is one of the most trusted brands in Internet security, creating award-winning endpoint security solutions that protect millions of PCs from hackers, spyware and data theft. Extending the power of the Check Point solution is its Open Platform for Security (OPSEC), the industry's framework and alliance for integration and interoperability with "best-of-breed" solutions from over 350 leading companies. Check Point solutions are sold, integrated and serviced by a network of more than 2,300 Check Point partners in 92 countries.


Cofense

Cofense focuses on engaging the human &emdash; your last line of defense after a phish bypasses other technology &emdash; and enabling incident response teams to quickly analyze and respond to targeted phishing attacks.


LookingGlass Cyber Solutions, Inc.

Headquarters: Arlington County, VA

LookingGlass Cyber Solutions delivers threat protection against cyber 
attacks to global enterprises and government agencies by operationalizing threat intelligence across scalable platforms and network-based threat response products. Our worldwide team of security analysts augment these integrated solutions by enriching our data feeds, reducing false positives, and delivering intelligence and response capabilities.