Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Security

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







2020 SANS Cyber Threat Intelligence

by DomainToolsApr 06, 2020

Cyber Threat Intelligence (CTI) is analyzed information about the capabilities, opportunities and intent of adversaries that meets a specific requirement determined by a stakeholder. Organizations with CTI programs focus on understanding the threats they face and providing specific information to help defend against those threats. In the past few years, CTI has evolved from small, ad-hoc tasks performed disparately across an organization to, in many cases, robust programs with their own staff,


Increase Cyber Defense Effectiveness through Simulation-Based On-Demand Learning

by RangeForceMar 24, 2020

Just as an airline pilot, who does not complete annual simulator training, will likely fail when handling an emergency, a cybersecurity pro, whose skills are lacking or who is out of practice, will fail to detect and contain an actual cyberattack when it happens. The consequences, in either case, can be catastrophic. The pilot, potentially causing loss of life, and the cyber pro, costing a company millions of dollars. Airlines recognize the importance of training, yet companies that spend


Use Case Coverage for Simulation Based Training

by RangeForceMar 24, 2020

Existing cybersecurity training methods do not adequately provide continuous training to security team members. Scalable security methods lack hands-on, high retention learning, while hands-on learning methods either do not scale or are way too expensive. But a new generation of eLearning and simulation technologies are both scalable and hands-on, changing the way security managers can build and train their teams.

Download this whitepaper to learn about the critical training uses cases


Calculating the Cost Savings of Simulation-Based Cybersecurity Training

by RangeForceMar 24, 2020

The average cost of a traditional online training class is over $6,000, and in-person classes are even higher. The cost of building a cyber range is close to half a million dollars, while renting a hardware based cyber range starts at $50K for a single exercise. These costs are prohibitive, and because of that, cybersecurity managers struggle to assess and improve the skills of their teams on a continuous basis. That lack of training and assessment is a significant contributor to the


A Market Guide to Simulation-Based Cybersecurity Training

by RangeForceMar 30, 2020

Learn why on-demand simulation-based cybersecurity training is essential for security teams in today's threat environment. This white paper defines the simulation-based training market, its training value, and its advantages to security leaders and security team members.

Download this whitepaper to learn about the on-demand simulation training market, including: What the cybersecurity on-demand simulation-based training market is and why it is important. The capabilities of these


Third-Party Cyber Defense: A New Level of Control & Visibility by Tracking the Adversary

by PrevailionApr 01, 2020

Most of today's businesses are beholden to a fundamental weakness—lack of visibility. As businesses grow larger, their vast third-party vulnerabilities unfurl themselves, exposing the business to huge risks they aren't even aware of and can't control.

Prevailion proposes a new paradigm for security. Instead of living cloistered within a defensive apparatus, surrounded by expensive endpoint solutions, we propose an offensive tactic - tracking the threat actors' every moves.


Osterman Research-Nation-State Attack Survey: Top CISO Concerns

by AnomaliMar 27, 2020

The Situation Between the United States and Iran is Influencing CISO's Security Strategy and Operations.

Nation-state attacks--in which military of non-military government entities seek to infiltrate other governments, enterprises, or non-commercial organizations--are on the rise. For example, Microsoft revealed in mid-2019 that 8,000 of its enterprise customers had been targeted by these types of attacks during the previous twelve months.

Nation-state attacks are


SANS 2020 Cyber Threat Intelligence Survey Results

by AnomaliMar 27, 2020

The Maturation of Cyber Threat Intelligence (CTI)

This year's survey had a record number of respondents (1,006) and the highest ever reporting of Cyber Threat Intelligence (CTI) programs within organizations. 2020 showed 80% of respondents reporting that they produce or consume CTI, an increase of 10% to last year.

As the field reaches maturity, understanding and improving the effectiveness of CTI programs will become more critical. This paper focuses on why finding the


Global Cloud Proxy Enables VPN Split Tunneling

by Menlo SecurityMar 26, 2020

Coupled with VPN split tunneling, the Menlo Security Global Cloud Proxy with an Isolation Core™ ensures that security policies are applied to all traffic without overwhelming bandwidth and capacity. To learn more, view this brief.


Gartner Report: Top Security and Risk Management Trends

by Palo Alto NetworksMar 24, 2020

See the security trends Gartner believes are ripe for disruption and get their recommendation on how to improve your organization's resilience and defenses.

Download Gartner's new report, "Top Security and Risk Management Trends" to learn why:

• XDR was named one of the top 9 cybersecurity trends
• Security process automation is the key to eliminating repetitive tasks
• AI will create new security responsibilities for protecting digital business initiatives


SUBTOPICS:

Anomali

Anomali detects adversaries and tells you who they are. Organizations rely on the Anomali Threat Platform to detect threats, understand the adversary, and respond effectively. Anomali arms security teams with machine learning optimized threat intelligence and identifies hidden threats targeting their environments. Anomali enables organizations to collaborate and share threat information among trusted communities and is the most widely adopted platform for ISACs worldwide.

For more information, visit our website below and follow us on Twitter @Anomali


DomainTools

DomainTools, the recognized leader in domain name research and monitoring tools, offers the most comprehensive searchable database of domain name registration, Whois records and hosting data for online investigations and research. Cyber security analysts, fraud investigators, domain professionals and marketers use DomainTools to investigate cybercrime, protect their assets and monitor online activity. DomainTools has 12 years of history on domain name ownership, Whois records, hosting data, screenshots and other DNS records. That's why customers say, "Every online investigation starts with DomainTools." DomainTools customers include many Fortune 1000 companies, leading vendors in the Security and Threat Intelligence community and most crime-fighting government agencies. Individual users can start with an online Free Trial available at http://www.domaintools.com. Enterprise accounts are available from http://www.domaintools.com/about/contact-us.


Menlo Security

Menlo Security protects organizations from cyberattacks by eliminating the threat of malware from the web, documents, and email. Menlo Security has helped hundreds of Global 2000 companies and major government agencies achieve Zero Trust Internet. The company's cloud-based Internet Isolation Platform scales to provide comprehensive protection across enterprises of any size, without requiring endpoint software or impacting the end-user experience.The company was named a Visionary in the Gartner Magic Quadrant for the Secure Web Gateway.


Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across cloud, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before.


Prevailion

Prevailion helps organizations reduce cyber risk by providing clear, real-time, and continuous visibility into compromises affecting their entire ecosystem, giving them a competitive edge and empowering them to make strategic business decisions about how, when and with whom to share access to their networks.


RangeForce

RangeForce delivers the industry's only integrated cybersecurity simulation and skills analysis platform that combines a virtual cyber range with hands-on advanced cybersecurity training. Cyber and IT professionals from all industry verticals use RangeForce to qualify their new-hires, train up DevOps, IT, and Security Staff, and run CyberSiege simulations to evaluate team skills. Only RangeForce can accurately show users where expertise gaps exist, fill those gaps with highly-effective simulation-based training, and accurately report on the entire process.