White Papers, Analyst, & Research Reports

A Guide To Threat Intelligence Selection | LookingGlass

A Guide To Threat Intelligence Selection And Use

When operationalized effectively, threat intelligence can help companies identify business risks and implement protections that specifically address their most serious cybersecurity challenges. This includes everything...

Read More >

hird Party Risk eBook Online

One Solution Does Not Fit All

Are your third party vendors a ticking time bomb? Outsourcing corporate data management to third party vendors is not new. We’ve all heard the saying,...

Read More >

2017 Actionable Threat Intelligence Survey

Do You Have the Policies, Personnel and Tools to Get the Most Out of Your Threat Intel? Download the survey to hear from Doug Dangremond,...

Read More >

Cyber Threat Intelligence Uses,Successes and Failures: The SANS 2017 CTI Survey

Over the past year, Yahoo revealed the largest data breaches in history,and nation-state hacking activity was suspected in tampering with the U.S. presidential election. More...

Read More >

White Paper: SANS 2016 Analytics and Intelligence Survey

SANS 2016 Analytics and Intelligence Survey

Based upon the 2015 survey results, SANS concluded that “results seem to indicate slow and steady progress but also underscore a significant lack of maturity...

Read More >

CIO Review - DDOS - 20 Most Promising Solution Providers 2016

CIOReview: Empowering Confident Real-Time Decisions

Today, an increasing security challenge is the large number of low-cost, poorly secured, connected devices spurred by the Internet of Things (IoT). Massive botnets of...

Read More >

building-a-threat-intelligence-program-that-works-for-you

Building A Threat Intelligence Program That Works For You – White Paper

In this white paper, Securosis, a top cyber security research and advisory firm, helps security teams learn how to develop a threat intelligence program that...

Read More >

Four Steps to Effectively Protecting Your Organization from Phishing Attacks

Four Steps to Protecting Against Phishing Attacks

Although it’s been around for years, phishing is still one of the most common and effective online scams. The explosive rise of mobile devices, mobile...

Read More >

4 KEYS TO OPERATIONALIZING THREAT INTELLIGENCE FOR THREAT PREVENTION, DETECTION, AND RESPONSE

Operationalizing Threat Intelligence: For Threat Prevention, Detection & Response

According to ESG research, security teams are investing in threat intelligence with the goals of becoming more efficient and effective at incident prevention, detection, and...

Read More >

logo-cio_review

CIOReview: CEO Perspectives Operationalizing Threat Intelligence

Businesses and governments continue to struggle with effectively and efficiently defending their organization and constituents from cyber attacks. The impact of cyber attacks is global...

Read More >