Category: Resources

White Paper: SANS 2016 Analytics and Intelligence Survey

White Paper: SANS 2016 Analytics and Intelligence Survey

Based upon the 2015 survey results, SANS concluded that “results seem to indicate slow and steady progress but also underscore a significant lack of maturity...

Read More >

Cybersecurity & The Road Ahead: Avoid Being The Next Target

Cybersecurity & The Road Ahead: Avoid Being The Next Target

Hear the first-hand account of Rick Snow of Main Indoor Karting who was hacked, and then get valuable advice from cybersecurity expert AJ Shipley of...

Read More >

cio insight logo

How to Deal With the Cyber Kill Chain

In the quest to stay ahead of cyber-threats, many cyber-security teams have turned to a well-understood military concept, the kill chain, which details how adversaries...

Read More >

CIO Review - DDOS - 20 Most Promising Solution Providers 2016

CIOReview: Empowering Confident Real-Time Decisions

Today, an increasing security challenge is the large number of low-cost, poorly secured, connected devices spurred by the Internet of Things (IoT). Massive botnets of...

Read More >

Secuosis - Building A Threat Intelligence Program That Works For You

Building A Threat Intelligence Program That Works For You

Webcast Building A Threat Intelligence Program That Works For You Thursday, November 17, 2016 9am PT/noon ET Speakers: Mike Rothman, Key Analyst and President at...

Read More >

building-a-threat-intelligence-program-that-works-for-you

White Paper: Building A Threat Intelligence Program That Works For You

In this white paper, Securosis, a top cyber security research and advisory firm, helps security teams learn how to develop a threat intelligence program that...

Read More >

Phishing Prevention: Be Suspicious and Don’t Get Hooked

Phishing Prevention: Be Suspicious and Don’t Get Hooked

Phishing Prevention: Be Suspicious and Don’t Get Hooked Webinar: Thursday, November 3rd at noon PT/3pm ET (or after view on demand) Speakers: James Carnall, Vice...

Read More >

Four Steps to Effectively Protecting Your Organization from Phishing Attacks

Four Steps to Protecting Against Phishing Attacks

Although it’s been around for years, phishing is still one of the most common and effective online scams. The explosive rise of mobile devices, mobile...

Read More >

THE LOOKINGGLASS ADVANTAGE

Power Up Your ArcSight Enabled SOC with Threat Intelligence

Turbocharge your SIEM and enable your SecOps to achieve results faster with the most comprehensive threat intelligence and threat mitigation platforms available in the market...

Read More >

4 KEYS TO OPERATIONALIZING THREAT INTELLIGENCE FOR THREAT PREVENTION, DETECTION, AND RESPONSE

Operationalizing Threat Intelligence: For Threat Prevention, Detection & Response

According to ESG research, security teams are investing in threat intelligence with the goals of becoming more efficient and effective at incident prevention, detection, and...

Read More >

top