TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

10 Emerging Threats Every Enterprise Should Know About

by Dark ReadingAug 13, 2018

This Dark Reading's August Tech Digest explores ten emerging security threats to enterprise data.

IN THIS REPORT: 10 Emerging Threats Every Enterprise Should Know About Trading Platforms Riddled with Severe Flaws Cracking Cortana: The Dangers of Flawed Voice Assistants Demystifying Mental Health in the Infosec Community New Hack Weaponizes the Web Cache The information submitted is collected by both UBM Tech and our sponsors.
UBM Tech's privacy policy.
Cofense

  • Dark Reading
  • Security
  • Security Monitoring
  • Security Management & Analytics
  • Risk Management/Security
  • Cloud Security
  • Cybersecurity
  • Details

Laying the Foundation for AI in the Contact Center

by Five9, Inc.Aug 08, 2018

Artificial intelligence (AI) will provide many of your contact center?s most important competitive advantages?and you need to start laying the groundwork now in order to deploy AI effectively. This webinar will offer critical advice on the two prerequisites for practical AI in the contact center: Moving to the cloud and integrating your CRM with your contact center.

Sheila McGee Smith, leading contact center industry analyst, and Scott Kolman, VP of Product Marketing at Five9,

  • Artificial Intelligence
  • Contact Centers
  • Cloud
  • Details

Security Analytics For Dummies

by SecuronixAug 08, 2018

Automation technology driven by security analytics and artificial intelligence has started to take over basic security tasks. This book explores the basics of security analytics and the need for action around advanced cyber threats.

  • Securonix
  • Security Management & Analytics
  • Cybersecurity
  • Details

2018 Cloud Security Report

by SecuronixAug 08, 2018

As companies move to the cloud, cybersecurity professionals are increasingly concerned. In this report learn more about the latest cloud cybersecurity trends and discover the most effective techniques to make your cloud secure and resilient.

  • Securonix
  • Cloud Security
  • Cybersecurity
  • Details

2018 GDPR Compliance Report

by SecuronixAug 08, 2018

GDPR is the most sweeping change in data privacy regulation in decades. Explore the latest GDPR compliance trends, and learn from the struggles and best practices of other companies.

  • Securonix
  • Security
  • Security Management & Analytics
  • Details

Next Gen SIEM – 7 Requirements to Look For

by SecuronixAug 08, 2018

Legacy SIEM struggles with alert flood and false positives; problems solved by next generation SIEM solutions with automated machine learning and behavior analytics. Learn what other features you need in a next generation SIEM solution.

  • Securonix
  • Security Management & Analytics
  • Cybersecurity
  • Details

Justifying Your Insider Threat Program: Seven ROI Metrics

by SecuronixAug 08, 2018

Security professionals often struggle to demonstrate the ROI of their security spend. Learn about reporting metrics that can help you measure the ROI of your insider threat program, and tips for communicating this to your management.

  • Securonix
  • Security Management & Analytics
  • Security
  • Details

Gamer Theory of Threat Hunting

by AnomaliAug 06, 2018

"Hackers can complete an entire data breach in under 15 hours, which includes exfiltrating data," according to a recent industry report.

In a multi-layered stack of security tools, it becomes a game of peeling or stripping back layers to find the core infection layer. When looking for the unknown infection or attack vector in your enterprise ecosystem, maybe organizations are shifting to iterative hunting exercises based around intelligence operations.

There are three key concepts

  • Anomali
  • Cybersecurity
  • Security Monitoring
  • Details

People's Republic of China (PRC) Cyber Security Profile

by AnomaliAug 06, 2018

As the top trading partner of over 120 countries and the third largest investor worldwide, China extends a significant influence over international economics and politics. China's expansion into cyberspace is reminiscent of their expansion into the global theater in both strategy and success.

This report from Anomali Labs explores how these circumstances have developed, as well as:

• International relations
• National cyber-strategy
• Influential military and

  • Anomali
  • Cybersecurity
  • Security Monitoring
  • Details

Cybersecurity Challenges for State and Local Governments

by AnomaliAug 06, 2018

State and local governments face unique challenges when it comes to defending critical infrastructures (CI) from cyber attacks, including regulations at the state and federal levels, limited resources, and an increasing attack surface.

Critical Infrastructures:

• Energy
• Transportation
• Water systems
• Gas
• Electric
• Emergency Services
• Law enforcement
• Public Health
• Education
• Elections

In

  • Anomali
  • Cybersecurity
  • Security Monitoring
  • Details