TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Cyber Threat Intelligence Inside Your Organization

by ExabeamNov 14, 2018

Information sharing and data about global attacks are useful, but some of the most important threat intelligence resides right inside your own organization. What can you learn by taking a closer look at your user lists and internal network traffic, your business plans and risk assessments? In this webinar, learn about the tools that can help your internal threat intelligence gathering, how to fine-tune your monitoring efforts, and how efforts like these could help you detect attackers and defend

  • Vulnerabilities & Threats
  • Details

Three New DDE Obfuscation Methods

by ReversingLabsNov 11, 2018

On September 10, 2018, the ReversingLabs Research team, working with other cybersecurity experts from Cisco Talos, uncovered a new spam campaign. The attack is spreading the Adwind 3.0 remote access tool (RAT) targeting Windows,Linux and Mac OSX operating systems. Most of the targets in this campaign are in Turkey, according to data from Cisco's Umbrella cloud security platform. Further research revealed important details about the attack and the forged Microsoft Office documents that the

  • ReversingLabs
  • Security
  • Security Monitoring
  • Details

Frost & Sullivan Report: SOC-as-a-Service Versus DIY SOC

by Arctic Wolf NetworksNov 09, 2018

Cybersecurity strategies often require a trade-off between overall effectiveness and the cost of cybersecurity controls. So, how do you determine what is the total cost of ownership (TCO) of people, process and technologies that keep any organization's assets protected from cybercriminals and malicious insiders?

In this cost analysis conducted by Frost & Sullivan, they determined that organizations with few, if any, dedicated infosec personnel spend over a three-year period up to 8.8

  • Arctic Wolf Networks
  • Cybersecurity
  • Security Monitoring
  • Details

A Cybersecurity Checklist for SaaS Applications

by Arctic Wolf NetworksNov 09, 2018

Today's digital perimeters grant authorized users anytime/anywhere access to sensitive business data. Because of this, SaaS-heavy IT environments introduce a higher complexity to threat detection and response efforts.

This checklist helps identify some of the core security-related SaaS activities that companies should continuously monitor and associates them to the types of incidents that may potentially be detected. Download it today!

  • Arctic Wolf Networks
  • Cybersecurity
  • Security Monitoring
  • Details

10 Emerging Threats to Today's Enterprise Applications

by Black Duck by SynopsysNov 08, 2018

Cyberattacks to today?s enterprises often begin by exploiting a new or recently discovered software vulnerability. What are some of these emerging application vulnerabilities, and how are attackers using them to crack security and expose critical business data? In this Dark Reading webinar, application security experts offer a look at some of the latest and most potentially damaging threats to current enterprise apps, and how those threats can expose your organization to data compromise and


The Insider Threat: Real Defense for Real Businesses

by Wombat Security TechnologiesNov 07, 2018

Insider data leaks, whether malicious or accidental, can be caused by anyone: the extra-helpful customer service rep, the highly privileged IT admin or the jet-setting CFO. How do you detect and mitigate insider data leaks and reduce the potential for such incidents in the first place? In this webinar, learn how cybersecurity professionals can address the insider threat without shutting down business.

  • Vulnerabilities & Threats
  • Details

Microsoft Teams; Securing the Network Edge

by OracleNov 07, 2018

As Microsoft Teams grows in adoption, security will naturally become a more critical factor. But now Oracle and Microsoft have entered into a partnership incorporating Oracle?s Communications portfolio with Microsoft Teams, offering new opportunities for secure team collaboration.

  • Microsoft
  • Team Collaboration
  • Oracle
  • Communications
  • Details

10 Best Practices That Could Reshape Your IT Security Department

by Dark ReadingNov 06, 2018

This is Dark Reading's November Tech Digest, explores ten best practices that could reshape IT security departments.

IN THIS REPORT: 10 Best Practices That Could Reshape Your IT Security Department Managing Data the Way We Manage Money The Cloud Security Conundrum: Assets vs. Infrastructure Think Like an Attacker: How a Red Team Operates The information submitted is collected by both UBM Tech and our sponsors.
UBM Tech's privacy policy.
Cofense • Anomali, Inc.

  • Dark Reading
  • Security
  • Strategic CIO
  • IT Strategy
  • Security platforms
  • Cybersecurity
  • Network & Perimeter Security
  • Details

The Network of the Future is Powered by AI

by Mist SystemsNov 01, 2018

Artificial intelligence (AI) promises to reshape the way IT organizations deploy and manage infrastructure and how users consume those services. On the networking front, AI allows networks to be more predictive and intelligent, with the ability to automatically make recommendations and implement policies to save time and money and reduce downtime. The IT department at Dartmouth College is on the leading edge of this movement, realizing that students learn best using a network architecture that


Lambda Architecture with In-Memory Technology

by DellOct 31, 2018

Envision a future in which executives have immediate access to streaming data detailing the inner workings of their business, where they can mine large data stores for valuable insights providing a competitive advantage. The path to achieving this vision isn?t always clear, but this webinar series can help.

The time of the traditional data warehouse is coming to an end. Designed to meet business intelligence needs of an earlier era traditional data warehouses can?t handle the