ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:DomainTools

  • 2020 Threat Hunting Survey Results

    Each year, SANS conducts a Threat Hunting Survey to better understand the threat hunting landscape and how security professionals are conducting threat hunting in their organizations – read on to unlock the results from this year’s survey.

  • Cybersecurity Report Card for 2020

    The past year has been extremely stressful for cybersecurity professionals – having to shift and enable a massive population of remote workers while dealing with the growing volume and severity of emerging cyberthreats. Read on to discover the results of the Cybersecurity Report Card Survey, where organizations rate how they handled 2020.

  • Threat Hunting Report

    Threat hunting is becoming the gold standard for addressing today’s increasingly disruptive cyberthreats – in fact, 93% of organizations agree that threat hunting should be a top security priority. Read this 2020 Threat Hunting Report for more insights and best practices as they related to the current state of threat hunting.

  • How to Elevate Your Threat Intelligence Program

    According to the SANS 2020 Cyber Threat Intelligence Survey, 82% of organizations find value in threat intelligence, however, only 4% of respondents had processes in place to measure effectiveness. So, how do you demonstrate and quantify the value of your threat intelligence program? View this Forrester-sponsored webcast to learn the answer.

  • Taking Control of Your Post-COVID-19 Budget

    With attackers taking advantage of the pandemic, threat surfaces increasing with remote work and budgets being reduced or postponed, security teams face a trifecta of challenges in maintaining or obtaining the resources they need to defend their organization. Watch this webcast featuring a CISO to learn how to make the most of the tools you have.

  • How to Identify Threats Faster and Increase Productivity

    With the rapid-fire speed of alerts and multitasking required in infosecurity, security operation center (SOC) professionals often must determine the potential outcomes of events with limited context. How can your teams reduce operational risk and be more productive? Watch this webinar to learn how to address this challenge and others.

  • How to Build a Robust Cyber Threat Intelligence Program

    Organizations looking to implement cyber threat intelligence (CTI) grapple with two challenges: lack of trained staff or lack of skills needed to fully utilize CTI, and lack of time to implement new processes. Watch this SANS webinar to see how to develop an effective CTI program despite these challenges.

  • Upgrade the Hunt with Splunk and DomainTools

    Splunk has just released an update for its prominent app DomainTools that offers enhanced detection, monitoring and diagnostic capabilities as well as more customization, self-service capabilities and deeper contexts within enterprise security. Watch this webcast to learn how you may be able to take your threat hunt to the next level.

  • The 2020 Study on Staffing the IT Security Function in the Age of Automation

    Automation is growing in popularity amongst IT security teams – offloading certain tasks in order to reduce workload and enhance productivity. In this report, discover the results of a Ponemon Institute study into the relationship between IT security staffing and automation.

  • Hunting Remote Access Trojans

    While cybersecurity pros don’t have the legal rights to “hack back”, they can learn what new controls are required, even before a threat actor envisions their new tool, technique or procedure. In this hunting guide, discover ways you can seek out threats using threat investigation tools.

  • SOAR Buyer’s Guide

    Many security teams are using SOAR platforms to operationalize threat intelligence. But not all security solutions are created equal and it’s important that all internal factors are taken into consideration when opting for one security solution over another. Dive into the SOAR Buyer’s Guide for everything you should consider.

  • How a Fortune 15 Technology Enterprise Proactively Detects Advanced Threats With DomainTools

    A Fortune 15 multinational technology company needed to identify malicious and copycat domains that might be used as a future attack vector against their infrastructure. In this case study, see how DomainTools allowed them to accelerate identification and response to potential domain-based threats, and much more.

  • The Value of Threat Intelligence

    With over 80% of organizations reporting 1 or more security incidents over the past year, it’s safe to say that security issues are common. This study shows that while most organizations can defend against malware attacks, they fail against most other threats. Read on to view the results of Osterman’s study into the value of threat intelligence.

  • Cyber Threat Intelligence

    As cyberattacks become more sophisticated and difficult to detect, proactive approaches to threat management are no longer viable for ensuring network security. In this solution brief, discover a proactive approach to threat intelligence that helps you identify & monitor threats while building a cyber threat database.

  • Detecting Malicious Domains Using Artificial Intelligence and Machine Learning

    As cybercriminals deploy more sophisticated attack methods to avoid detection, organizations need to ensure their security tactics can evolve at the pace of these threats. Download this white paper to take a closer look at how machine learning & AI can bolster your security by detecting malicious activity across various domains.

  • SIEM Buyer’s Guide

    SIEM programs have become a critical part of the way organizations are able to monitor their network and mitigate potential risks. Is your organization interested in SIEM? Download this buyer’s guide and take a closer look at what defines SIEM, who uses it and an evaluation checklist for selecting the right solution.

  • Government Agency Embraces Domain Intelligence to Pre-emptively Block Threats

    In this case study, discover how a major metropolitan government agency was able to incorporate a platform that enabled them to anticipate & block threats before they breach the perimeter and utilize their existing data to improve their collective intelligence to optimize IT resources. Download the report to take a closer look.

  • Precisely Target Alerts and Hunt Threats Across Your Enterprise with DomainTools and Splunk

    In this product overview, see how DomainTools enables SOCs and security analysts to take indicators from their network, including domains and IPs, and connect them with active domains on the Internet.

  • Strategies to Vet Your Threat Intelligence and Reduce False Positives

    This paper discusses detection strategies to reduce false positives, and models that improve threat hunting and investigations outcomes. Also uncover leading tools that help teams make the most of their limited time and resources.

  • DomainTools Guide to Threat Hunting with Splunk and Phantom

    Threat hunting is a hypothesis driven approach to validating the collection, detection and analysis of data ahead of an incident. The first step to integrating threat hunting into your organization is establishing a true threat hunting program. In this webcast, learn about a number of threat hunting essentials.

  • The Beginner's Guide to Threat Hunting

    Threat hunting is a hypothesis driven approach to validating the collection, detection and analysis of data ahead of an incident. It is important to establish a threat hunting process to have for reference before any possible incidents. In this webcast, learn about the key steps to creating a threat hunting process.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.