2017 Actionable Threat Intelligence Survey

2017 Actionable Threat Intelligence Survey

Do You Have the Policies, Personnel and Tools to Get the Most Out of Your Threat Intel? Download ...

Cyber Threat Intelligence Uses,Successes and Failures: The SANS 2017 CTI Survey

Over the past year, Yahoo revealed the largest data breaches in history,and nation-state hacking ...
White Paper: SANS 2016 Analytics and Intelligence Survey

SANS 2016 Analytics and Intelligence Survey

Based upon the 2015 survey results, SANS concluded that “results seem to indicate slow and steady ...
CIO Review - DDOS - 20 Most Promising Solution Providers 2016

CIOReview: Empowering Confident Real-Time Decisions

Today, an increasing security challenge is the large number of low-cost, poorly secured, connected ...
building-a-threat-intelligence-program-that-works-for-you

Building A Threat Intelligence Program That Works For You

In this white paper, Securosis, a top cyber security research and advisory firm, helps security ...
Threat Intelligence-As-A-Service: Fortify Your Security Posture

Threat Intelligence-As-A-Service: Fortify Your Security Posture

Security organizations face numerous challenges, from increasingly large volumes of data and lack ...
Are Your Third Party Vendors Exposing Your Organization to Cyber Threats?

Are Your Third Party Vendors Exposing Your Organization to Cyber Threats?

By now, the majority of us have likely been inundated with stories about third party data breaches ...
Eric Olson, VP of Intelligence Operations at LookingGlass Cyber Solutions

Understanding the dark web and how it factors into cybersecurity

In this podcast recorded at Black Hat USA 2017, Eric Olson, VP of Intelligence Operations at ...
STIX and TAXII: Sharing cyber threat intelligence

STIX and TAXII: Sharing cyber threat intelligence

"STIX and TAXII: Sharing cyber threat intelligence" from Black Hat USA 2017 by Allan Thomson, ...
Are Your Third Parties a Ticking Time Bomb?

Are Your Third Parties a Ticking Time Bomb?

Are Your Third Parties a Ticking Time Bomb? Outsourcing and strategic partnerships are a staple in ...
Brand Abuse Detection

Brand Abuse Detection

LookingGlass Brand Abuse Detection protects organizations against the unauthorized use of their ...
Compromised-Information-Monitoring-DataSheet

Compromised Information Monitoring

LookingGlass Compromised Information Monitoring (CIM) provides early warning of compromised account ...
3. Corporate Cyber Attack Surface Analysis

Corporate Cyber Attack Surface Analysis

The LookingGlass™ Corporate Cyber Attack Surface Analysis provides organizations with a detailed, ...
Cyber Safety Awareness Training

Cyber Safety Awareness Training

LookingGlass Cyber Safety Awareness Training is an award-winning education program designed to help ...
datasheet-cyber-threat-center

Cyber Threat Center

The LookingGlass Cyber Threat Center™ (CTC) is a threat intelligence platform that monitors, ...

DNS Bot Attacks and White-listing

While protocol-specific protection solutions for DNS recently became widely visible with the rise ...

Uncovering and Stopping the Effects of a DoS Bot Attack

Wind Telecomunicazioni SpA (Wind Italy) is the third largest telecommunications service provider in ...

How Lighttower Fought a DNS Botnet Attack

In late 2013, network engineers at Lightower Fiber Networks began noticing a performance pattern. ...