Category: White Papers

Cyber Threat Intelligence Uses,Successes and Failures: The SANS 2017 CTI Survey

Over the past year, Yahoo revealed the largest data breaches in history,and nation-state hacking activity was suspected in tampering with the U.S. presidential election. More...

Read More >

White Paper: SANS 2016 Analytics and Intelligence Survey

White Paper: SANS 2016 Analytics and Intelligence Survey

Based upon the 2015 survey results, SANS concluded that “results seem to indicate slow and steady progress but also underscore a significant lack of maturity...

Read More >

CIO Review - DDOS - 20 Most Promising Solution Providers 2016

CIOReview: Empowering Confident Real-Time Decisions

Today, an increasing security challenge is the large number of low-cost, poorly secured, connected devices spurred by the Internet of Things (IoT). Massive botnets of...

Read More >

building-a-threat-intelligence-program-that-works-for-you

White Paper: Building A Threat Intelligence Program That Works For You

In this white paper, Securosis, a top cyber security research and advisory firm, helps security teams learn how to develop a threat intelligence program that...

Read More >

Four Steps to Effectively Protecting Your Organization from Phishing Attacks

Four Steps to Protecting Against Phishing Attacks

Although it’s been around for years, phishing is still one of the most common and effective online scams. The explosive rise of mobile devices, mobile...

Read More >

4 KEYS TO OPERATIONALIZING THREAT INTELLIGENCE FOR THREAT PREVENTION, DETECTION, AND RESPONSE

Operationalizing Threat Intelligence: For Threat Prevention, Detection & Response

According to ESG research, security teams are investing in threat intelligence with the goals of becoming more efficient and effective at incident prevention, detection, and...

Read More >

logo-cio_review

CIOReview: CEO Perspectives Operationalizing Threat Intelligence

Businesses and governments continue to struggle with effectively and efficiently defending their organization and constituents from cyber attacks. The impact of cyber attacks is global...

Read More >

White Paper: Advanced Threat Intelligence-Driven Security

White Paper: Advanced Threat Intelligence-Driven Security

Enterprise risk and security operations are seeking a tighter coupling and more automated and integrated processes within the overall security technology investment portfolio with the...

Read More >

Mobile Security Threat Landscape: Recent Trends and 2016 Outlook

The mobile landscape is exploding, with a prediction that there will be more than six billion global smartphone users by 2020. As more people turn...

Read More >

Information Security Threat Landscape: Recent Trends and 2016 Outlook

2015 was a landmark year for information security. We saw new and sophisticated malvertising campaigns, a shift in hacktivists’ tactics, an increased emphasis on vendor/third-party...

Read More >

top