Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Anomali, Inc.


Latest Content From Anomali, Inc.

Webcast: Know Thyself: Cyber Threat Intelligence Gathering Inside Your Organization

by Anomali, Inc.Dec 04, 2019

Some of the most important threat intelligence resides right inside your own organization. What can you learn by taking a closer look at your SIEM, internal telemetry, user lists, and other sources?

In this webinar, learn about the tools that can help your internal threat intelligence gathering and how these efforts could help you detect attackers’ lateral movement, disrupt ransomware and protect endpoint devices.


Webcast: Building an Incident Readiness and Response Playbook

by Anomali, Inc.May 08, 2019

The cyber attackers hit their mark: now what do you do? Whom do you call first? Do you have a plan to contain the damage, eliminate the threat, avoid destruction of forensic evidence, and keep the business operational at the same time? Do you know how to uphold compliance requirements, address customer questions, and pay for all the unforeseen costs of an emergency? Don't make a data breach any harder than it needs to be. In this webinar, learn the Xs and Os of any good security incident readiness and response playbook.


Webcast: Closing the Threat Intelligence Effectiveness Gap

by Anomali, Inc.Feb 27, 2019

In a recently released Ponemon Institute report, "The Value of Threat Intelligence: Annual Study of North American & United Kingdom Companies," the importance of threat intelligence in achieving a strong cybersecurity posture is rated as very high at 85%, but only 41% of respondents felt that they are utilizing their threat intelligence effectively.

The report reveals that security professionals believe threat intelligence is often too voluminous and/or complex to provide actionable insights. It also states that - despite security being a business priority - security professionals struggle in sharing essential threat data to the C-Suite and above. Findings also suggest security teams are not optimized to deliver on threat intelligence and they often lack experienced subject matter experts.

Tune in to this webinar to learn about the overload of threat intelligence data and what your peers are citing as important in the day-to-day protection of their networks.