TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Understanding and Preventing Social Engineering Attacks

by SlashNextFeb 20, 2019

While cyber attackers continually develop more sophisticated methods for penetrating enterprise computing systems, most exploits begin with a simple step: fooling users into breaking security policy. These "social engineering" attacks ? including phishing, "watering holes", and social network attacks ? are designed to trick your users into giving up passwords, opening malicious email attachments, or installing malware. How can enterprises prevent this sort of attack? Can users be trained


EMA Report: TLS 1.3 Adoption in the Enterprise

by ExtraHopFeb 20, 2019

Read the new research from EMA on how encryption is impacting enterprises, and how they're preparing for even further transformation due to TLS 1.3 and perfect forward secrecy.

  • ExtraHop
  • Security Monitoring
  • Network & Perimeter Security
  • Details

Reveal(x) Reviewer's Guide

by ExtraHopFeb 20, 2019

As you go through the guide, you will learn how Reveal(x) can help your organization increase efficiency and confidence through unprecedented visibility, definitive insights, and immediate answers.

  • ExtraHop
  • Security Monitoring
  • Security Management & Analytics
  • Details

Demisto Secures its AWS-based Container Pipeline

by Aqua Security Software Inc.Feb 20, 2019

Demisto integrates security into its container-based development pipeline and at every stage from image build to container deployment and runtime. This case study explains how.

  • Aqua Security Software Inc.
  • Security
  • Security Monitoring
  • Cloud Security
  • Details

2018 Security Report

by Check Point Software Technologies Ltd.Feb 19, 2019

From the resurgence of destructive ransomware, IoT botnets, data breaches and mobile malware to sophisticated multi-vector technologies, it is clear we are witnessing an inflection point and a transition to the fifth generation of cyber attacks. Arm yourself with all the facts.

  • Check Point Software Technologies Ltd.
  • Security Monitoring
  • Security Management & Analytics
  • Details

Cyber Attack Trends Report

by Check Point Software Technologies Ltd.Feb 19, 2019

Ransomware, last year's breakout attack method, now plays second fiddle to cryptomining malware. Discover which threats are on the uptick and which are declining in this report from Check Point's team of security experts.

  • Check Point Software Technologies Ltd.
  • Security Monitoring
  • Cybersecurity
  • Details

Cyber Security Guide for Executives

by Check Point Software Technologies Ltd.Feb 19, 2019

A guide for c-level executives to better understand the considerations around cybersecurity, how cyberattacks are evolving, and what to be aware of to lead a secure organization. Learn about the latest trends and how cybersecurity is changing from the perspectives of the attackers and the technologies.

  • Check Point Software Technologies Ltd.
  • Cybersecurity
  • Security Monitoring
  • Details

Prevent Data Breaches in 8 Steps

by Check Point Software Technologies Ltd.Feb 19, 2019

Cyber criminals continue to unleash data breach attacks on organizations around the globe. In 2017, the average cost of a breach for a U.S. company was an estimated US$8 million. Such attacks are becoming more targeted, evasive, and lucrative. It's no long a matter of if, but when your organization will suffer a data breach. The good news is that the eight steps outlined in this paper can go far to prevent a targeted data breach.

  • Check Point Software Technologies Ltd.
  • Cybersecurity
  • Security Monitoring
  • Details

Gartner Magic Quadrant for ENFW

by Check Point Software Technologies Ltd.Feb 19, 2019

Completeness of vision and ability to execute are just two reasons why Gartner named Check Point a Leader in the 2018 Magic Quadrant for Enterprise Network Firewalls. Get the details in this new report.

  • Check Point Software Technologies Ltd.
  • Security Management & Analytics
  • Security Monitoring
  • Details

Practical Cyber Defense for Industrial Control Systems

by Nozomi NetworksFeb 14, 2019

Industrial control systems (ICS) environments are being targeted by more sophisticated threats every day; but the security professionals who defend ICS environments face significant limitations. Patching practices and scanning tools that are common in most IT environments are often unacceptable for ICS, which may operate critical infrastructure and require 24/7 uptime. In this Dark Reading webinar, top experts offers insight on the threat posed to ICS systems, and how you can expand your

  • Cybersecurity
  • Security
  • Internet of Things
  • Details