Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Government

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Increase Cyber Defense Effectiveness through Simulation-Based On-Demand Learning

by RangeForceMar 24, 2020

Just as an airline pilot, who does not complete annual simulator training, will likely fail when handling an emergency, a cybersecurity pro, whose skills are lacking or who is out of practice, will fail to detect and contain an actual cyberattack when it happens. The consequences, in either case, can be catastrophic. The pilot, potentially causing loss of life, and the cyber pro, costing a company millions of dollars. Airlines recognize the importance of training, yet companies that spend


Use Case Coverage for Simulation Based Training

by RangeForceMar 24, 2020

Existing cybersecurity training methods do not adequately provide continuous training to security team members. Scalable security methods lack hands-on, high retention learning, while hands-on learning methods either do not scale or are way too expensive. But a new generation of eLearning and simulation technologies are both scalable and hands-on, changing the way security managers can build and train their teams.

Download this whitepaper to learn about the critical training uses cases


Calculating the Cost Savings of Simulation-Based Cybersecurity Training

by RangeForceMar 24, 2020

The average cost of a traditional online training class is over $6,000, and in-person classes are even higher. The cost of building a cyber range is close to half a million dollars, while renting a hardware based cyber range starts at $50K for a single exercise. These costs are prohibitive, and because of that, cybersecurity managers struggle to assess and improve the skills of their teams on a continuous basis. That lack of training and assessment is a significant contributor to the


A Market Guide to Simulation-Based Cybersecurity Training

by RangeForceMar 30, 2020

Learn why on-demand simulation-based cybersecurity training is essential for security teams in today's threat environment. This white paper defines the simulation-based training market, its training value, and its advantages to security leaders and security team members.

Download this whitepaper to learn about the on-demand simulation training market, including: What the cybersecurity on-demand simulation-based training market is and why it is important. The capabilities of these


Third-Party Cyber Defense: A New Level of Control & Visibility by Tracking the Adversary

by PrevailionApr 01, 2020

Most of today's businesses are beholden to a fundamental weakness—lack of visibility. As businesses grow larger, their vast third-party vulnerabilities unfurl themselves, exposing the business to huge risks they aren't even aware of and can't control.

Prevailion proposes a new paradigm for security. Instead of living cloistered within a defensive apparatus, surrounded by expensive endpoint solutions, we propose an offensive tactic - tracking the threat actors' every moves.


SANS 2020 Cyber Threat Intelligence Survey Results

by AnomaliMar 27, 2020

The Maturation of Cyber Threat Intelligence (CTI)

This year's survey had a record number of respondents (1,006) and the highest ever reporting of Cyber Threat Intelligence (CTI) programs within organizations. 2020 showed 80% of respondents reporting that they produce or consume CTI, an increase of 10% to last year.

As the field reaches maturity, understanding and improving the effectiveness of CTI programs will become more critical. This paper focuses on why finding the


MITRE ATT&CK Workbook

by Carbon BlackSep 27, 2019

Divided into 12 Tactics, ATT&CK defines roughly 300 Techniques (TIDs) to define how an adversary can achieve each tactic. The intent of this workbook is to provide a starting point for organizations looking to map to the ATT&CK Framework or simply better their security posture in 3 simple steps. Download our workbook today to learn more!


Cyber Attack Evasion Techniques

by Deep InstinctFeb 07, 2020

When it comes to evasion techniques there?s a perpetual cat and mouse game between malware developers and solutions providers. By drawing on the latest in evasion techniques, malware developers not only go undetected on the compromised machine but more importantly, they hide their malicious indicators and behaviors from detection tools and automated threat analysis systems.


2020 Cybersecurity Outlook Report

by Carbon BlackMar 23, 2020

In the search for clarity in the modern attacker vs. defender battle, it's all about behaviors

The conflict of "good vs. evil" is a theme that's captivated humanity throughout history, spanning religion, ethics, philosophy, politics, art, literature, and cinema. Often with larger-than-life characters leading the narrative, the "good vs. evil" conflict reveals humanity's intrinsic desire to be safe amidst an omniscient and, often, ephemeral sense of fear.

Our goal is to offer a


Endpoint Security 2020: The Resurgence of EPP and the Manifest Destiny of EDR

by Carbon BlackMar 23, 2020

The big EDR news of 2020 will be about extending EDR beyond the endpoint into other sources of telemetry and other control points such as: the network, the user, and the application. It's about factoring in greater context about applications and infrastructure. Some call this extended EDR — or XDR. The combination of the Carbon Black team with VMware — the digital foundation of mobility, cloud and modern application frameworks — is in the strongest position of anyone to execute


SUBTOPICS:

Anomali

Anomali detects adversaries and tells you who they are. Organizations rely on the Anomali Threat Platform to detect threats, understand the adversary, and respond effectively. Anomali arms security teams with machine learning optimized threat intelligence and identifies hidden threats targeting their environments. Anomali enables organizations to collaborate and share threat information among trusted communities and is the most widely adopted platform for ISACs worldwide.

For more information, visit our website below and follow us on Twitter @Anomali


Carbon Black

Carbon Black has designed the most complete next-gen endpoint-security platform, enabling organizations to stop the most attacks, see every threat, close security gaps, and evolve their defenses. The Cb Endpoint Security Platform helps organizations of all sizes replace legacy antivirus technology, lock down systems, and arm incident response teams with advanced tools to proactively hunt down threats. Today, Carbon Black has approximately 2,000 worldwide customers, including 25 of the Fortune 100 and more than 600 employees. Carbon Black was voted Best Endpoint Protection by security professionals in the SANS Institute's Best of 2015 Awards.


Prevailion

Prevailion helps organizations reduce cyber risk by providing clear, real-time, and continuous visibility into compromises affecting their entire ecosystem, giving them a competitive edge and empowering them to make strategic business decisions about how, when and with whom to share access to their networks.


RangeForce

RangeForce delivers the industry's only integrated cybersecurity simulation and skills analysis platform that combines a virtual cyber range with hands-on advanced cybersecurity training. Cyber and IT professionals from all industry verticals use RangeForce to qualify their new-hires, train up DevOps, IT, and Security Staff, and run CyberSiege simulations to evaluate team skills. Only RangeForce can accurately show users where expertise gaps exist, fill those gaps with highly-effective simulation-based training, and accurately report on the entire process.