Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Government

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







SANS 2019 Top New Attacks and Threat Report

by AnomaliOct 16, 2019

Basic Security Hygiene Practices are Key to Avoiding the Majority of Commodity Attacks

There is no shortage of media coverage of cybersecurity breaches and outages, and there are many places to find statistics about how many attacks were launched in cyberspace. What is harder to find is expert advice on areas that are worth focusing your resource and efforts on in an effort to protect your organization.

This SANS whitepaper analyzes a baseline of breach and malware data from


SANS 2019 SOC Survey

by AnomaliOct 16, 2019

SANS Common and Best Practices for Security Operations Centers (SOC)

Lack of skilled staff, budget, and effective automation are the most commonly cited reasons for failing to achieve excellence in existing SOCs. To gain management support for resources, SOC managers need to move beyond quantity-based metrics to business-relevant metrics.

In this survey, senior SANS instructor and course author Christopher Crowley, along with advisor and SANS director of emerging technologies


SC Media Expert Focus: The Community Approach to Sharing Security Intel

by AnomaliOct 16, 2019

When Everyone Participates—Sharing and ISACs Can Be a Vital Source of Security Intelligence

Information Sharing Analysis Centers (ISACs) are private sector organizations that are sometimes known as Information Sharing and Analysis Organizations (ISAOs). They are one of the most effective weapons against mass cyberattacks, but companies often join ISACs without a firm plan in place on how to interact and leverage threat intel for the biggest return.

The key challenge


2019 Threat Hunting Report

by DomainToolsOct 14, 2019

Based on a comprehensive survey of cybersecurity professionals in our 400,000-member Information Security Community on LinkedIn, the 2019 Threat Hunting Report confirms that organizations are increasing their operational maturity and investments in threat hunting. Organizations realize that proactively uncovering security threats pays off with earlier detection, faster response, and effective denial of future exploits that can damage business operations. This survey also includes information


Developing a Threat Hunting Program: Checklist: A 5-Step Guide

by DomainToolsOct 14, 2019

This 5-step guide will help you understand how to conduct internal and external threat hunting activities in a programmatic manner as well as help organizations new to threat hunting create the foundations for conducting threat hunts.


2019 SANS Incident Response Survey Report

by DomainToolsOct 14, 2019

Information security rarely has a dull day. The past year delivered significant data breaches, impacting industries ranging from hospitality to legal to social media. We've seen a continuation of financially motivated threats, such as business compromise (BEC), which continue to pillage and drain corporate bank accounts. Ransomware has brought multiple cities to their knees, earning threat actors significant funds in the process. Coupled with the ever-looming threat that a nation-state-sponsored


Phishing Threat and Malware Review 2019

by CofenseOct 09, 2019

You've got mail. Look out. This report is about evolution, how phishing emails and malware are in a state of constant flux. But one thing hasn't changed: phishing is still the #1 cyber-attack vendor. The vast majority of breaches begin with malicious emails or other social engineering and most malware is delivered by email.

Download this report to learn more about:

• Threats that made it through the email gateway
• Rapid changes in Emotet (aka Geode)
• The


Cyber Risk Benchmarking: What the Business Needs to Know

by Tenable, Inc.Oct 02, 2019

See how cyber risk benchmarking helps you drive a new dialogue with the C-suite and board. Get the ebook now.


Technical Whitepaper: Cyber Exposure Score

by Tenable, Inc.Oct 02, 2019

See how the Cyber Exposure Score, derived through data science, can help improve your security posture.


2019 Online Malware and Threats: A Profile of Today's Security Posture

by Dark ReadingSep 30, 2019

Dark Reading's 2019 Malware and Threat Report shows that cybercriminals have ramped up their attack volumes sharply-- especially those involving phishing attempts, ransomware, and business email compromise (BEC). The constant pummeling is putting new strain on risk assessment and threat response processes in many organizations.

The newly released report based on our 2019 survey revealed a high level of concern over several new and emerging threats, including attacks on cloud service


SUBTOPICS:

Anomali

Anomali detects adversaries and tells you who they are. Organizations rely on the Anomali Threat Platform to detect threats, understand the adversary, and respond effectively. Anomali arms security teams with machine learning optimized threat intelligence and identifies hidden threats targeting their environments. Anomali enables organizations to collaborate and share threat information among trusted communities and is the most widely adopted platform for ISACs worldwide.

For more information, visit our website below and follow us on Twitter @Anomali


Cofense

Cofense focuses on engaging the human &emdash; your last line of defense after a phish bypasses other technology &emdash; and enabling incident response teams to quickly analyze and respond to targeted phishing attacks.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


DomainTools

DomainTools, the recognized leader in domain name research and monitoring tools, offers the most comprehensive searchable database of domain name registration, Whois records and hosting data for online investigations and research. Cyber security analysts, fraud investigators, domain professionals and marketers use DomainTools to investigate cybercrime, protect their assets and monitor online activity. DomainTools has 12 years of history on domain name ownership, Whois records, hosting data, screenshots and other DNS records. That's why customers say, "Every online investigation starts with DomainTools." DomainTools customers include many Fortune 1000 companies, leading vendors in the Security and Threat Intelligence community and most crime-fighting government agencies. Individual users can start with an online Free Trial available at http://www.domaintools.com. Enterprise accounts are available from http://www.domaintools.com/about/contact-us.