Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Building a Threat Intelligence Program: Research Findings on Best Practices and Impact

by ThreatConnectSep 13, 2019

We surveyed over 350 cybersecurity decision makers about their services, products, and methods. This resulting report found that organizations that are leveraging threat intelligence to combat increasing cyber threats have seen a large business impact. In fact, organizations credit threat intelligence programs with saving businesses an average of $8.8 million over twelve months.

  • ThreatConnect
  • Security Management & Analytics
  • Security platforms
  • Details

SOAR Platforms: Everything You Need to Know

by ThreatConnectSep 13, 2019

With a SOAR solution, it's possible to process data and mitigate threats in a single platform. You'll also learn how you can adapt to the adversarial landscape and use automation and orchestration to streamline your organization's security approach.

  • ThreatConnect
  • Security platforms
  • Security Monitoring
  • Details

Threat Intelligence Platforms: Everything You Want to Know, But Didn't Know to Ask

by ThreatConnectSep 13, 2019

Download this ebook to learn how a Threat Intelligence Platform (TIP) can help your organization move faster, collaborate more intently, and make better use of existing tools to aggregate, analyze, and act on threat intelligence. This book also talks about how to effectively use threat intelligence, expected capabilities of a TIP, the future of threat intel, and more. Read to the very end for a TIP checklist.

  • ThreatConnect
  • Security platforms
  • Security Management & Analytics
  • Details

Open Source vs. Commercial Threat Intelligence Platforms

by ThreatConnectSep 13, 2019

In this whitepaper, we discuss the key technical and economic considerations every security team needs when contemplating an open source or commercial threat intelligence platform. It will help you narrow down what your team needs and what solution best fits your cybersecurity strategy.

  • ThreatConnect
  • Security platforms
  • Security Management & Analytics
  • Details

More is Not More: Busting the Threat Intel Myth

by ThreatConnectSep 13, 2019

It's a common misconception that a large quantity of threat intelligence feeds leads to more effective security. But instead of adding more threat intel feeds, you should incorporate the feeds that provide the most value to your organization's security operations. Download this paper to learn your options when it comes to threat intel feeds; how to evaluate feeds' quality; and which are the right feeds for your organization.

  • ThreatConnect
  • Security Management & Analytics
  • Security platforms
  • Details

Build Your Own SOC or Partner with an MSSP

by BlueVoyantSep 12, 2019

Underprotected companies offer the path of least resistance and the quickest return on investment for a cyberattack. Regardless of company size, the financial risks demand an effective, efficient, and high-end SOC to protect their businesses. In this treacherous environment, organizations need to dramatically improve their security posture. Management must weigh the costs and benefits of building, staffing, and managing their own SOC, or partnering with an MSSP. When making this decision, it is

  • BlueVoyant
  • Security Management & Analytics
  • Security Monitoring
  • Details

Quick Guide to Calculating the Cost of Ransomware

by BlueVoyantSep 12, 2019

In today's threat landscape, organizations need to proactively determine what they are going to do; Pay, Not Pay, or Defend. An important place to start is calculating the financial risks of ransomware. The math is straightforward. The calculations presented in this whitepaper can be used as a starting point. They can be used to facilitate conversations between Security Teams, Business Owners, IT Teams and Senior Management. They can be used to drive more effective security strategies and

  • BlueVoyant
  • Security Management & Analytics
  • Security Monitoring
  • Details

9 Ways Cybercriminals Disrupt Business Operations

by BlueVoyantSep 12, 2019

The cyber battlefield has evolved and become much more complex. For businesses and governments, the fear of a global cyberattack is no longer an abstract thought; it is a stark reality. Businesses face the challenge of protecting their systems and operations from threat actors with sophisticated techniques, tactics, and procedures that are capable of launching a devastating cyberattack. It is essential that companies become more proactive and predictive in mitigating risk. To support businesses

  • BlueVoyant
  • Security Management & Analytics
  • Security Monitoring
  • Details

Tales from the Dark Web

by BlueVoyantSep 12, 2019

Cybercriminals are well funded, organized, and increasingly sophisticated. They continue to leverage the deep and dark web to crowdsource the latest techniques and coordinate attacks. Today we see the lines between cyber organized crime and nation-state operations blurred. Mid-sized organizations are a very lucrative target for hackers. Few know this better than former CTO and Senior Special Agent of the FBI's Cyber Division, Milan Patel. Milan has seen those cyber attacks firsthand and has led

  • BlueVoyant
  • Security Management & Analytics
  • Security Monitoring
  • Details

The Race is On: Stop Zero-Hour Phishing Attacks

by SlashNextSep 11, 2019

From mere minutes to the first user opens and clicks on malicious emails, attachments, and URLs, attackers hook virtually 100% of their phishing victims within the first 4 to 8 hours - by which time they have shut down 75% of their phishing URLs and moved on. With so much at stake based on this accelerating race against time, successful protection of your organization's email and websites against phishing attacks requires a high-speed, highly automated approach.

A recent Aberdeen report,

  • SlashNext
  • Cybersecurity
  • Security Management & Analytics
  • Details