Resource Center

White Papers, Articles & Research Reports

Cyber Threat Intelligence Uses,Successes and Failures: The SANS 2017 CTI Survey

Over the past year, Yahoo revealed the largest data breaches in history,and nation-state hacking activity was suspected in tampering with the U.S. presidential election. More...

Read More >

White Paper: SANS 2016 Analytics and Intelligence Survey

White Paper: SANS 2016 Analytics and Intelligence Survey

Based upon the 2015 survey results, SANS concluded that “results seem to indicate slow and steady progress but also underscore a significant lack of maturity...

Read More >

cio insight logo

How to Deal With the Cyber Kill Chain

In the quest to stay ahead of cyber-threats, many cyber-security teams have turned to a well-understood military concept, the kill chain, which details how adversaries...

Read More >


 

View All White Papers, Articles & Research Reports >>>

Videos, Webcasts & Podcasts
the cyberwire

The CyberWire Daily Podcast for 03.23.17

In today's podcast we offer a rundown of recently announced threats and vulnerabilities in stores and documents: Play Store, App Store, and MS Office. Some...

Read More >

How Are You Managing Your Cyber Risk From Your Third-Party Relationships?

How Are You Managing Cyber Risk From Your Third-Party Relationships?

Outsourcing and strategic partnerships have become a staple in today's business climate, enabling organizations to drive business value and stay ahead of the competition....

Read More >

SANS Fourth Annual Security Analytics Survey & Webcast

Webinar: Results of the 2017 Cyber Threat Intelligence Survey

Cyber threat intelligence (CTI) usage is maturing, but organizations still have a long way to go, based on our 2016 CTI survey results. This webcast...

Read More >


 

View All Videos, Webcasts & Podcasts >>>

 

Datasheets & Tech Notes
Compromised-Information-Monitoring-DataSheet

Compromised Information Monitoring

LookingGlass Compromised Information Monitoring (CIM) provides early warning of compromised account credentials, compromised credit card numbers and compromised Social Security Numbers discovered in the wild....

Read More >

SPECIAL INVESTIGATIONS UNIT (SIU)

Special Investigations Unit (SIU)

The LookingGlass Special Investigations Unit (SIU) provides a highly skilled, experienced team of cyber intelligence analysts that can conduct web-based searches, investigations and analyses quickly,...

Read More >

SCOUTVISION™ Threat Intelligence Platform

SCOUTVISION™

LookingGlass ScoutVision™ is a threat intelligence platform designed for security analysts hunting specific threats. With ScoutVision, analysts can deliver both strategic and tactical guidance to...

Read More >


View All Datasheets & Tech Notes >>>

Case Studies

DNS Bot Attacks and White-listing

While protocol-specific protection solutions for DNS recently became widely visible with the rise of solutions from large IP address management (IPAM)1 vendors, CloudShield DNS Defender™...

Read More >

Uncovering and Stopping the Effects of a DoS Bot Attack

Wind Telecomunicazioni SpA (Wind Italy) is the third largest telecommunications service provider in Italy servicing millions of customers. Near the end of 2013, the Wind...

Read More >

How Lighttower Fought a DNS Botnet Attack

In late 2013, network engineers at Lightower Fiber Networks began noticing a performance pattern. Some of their DNS servers were carrying high processing loads at...

Read More >


View All Case Studies >>>

 

Want to learn more about LookingGlass™ products and services?

Email sales@lookingglasscyber.com to have a representative contact you.

top