ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Farsight Security

  • Introduction to DNSDB Part 2: Walk

    Many people on the internet behave in a way that can be considered ‘unaccountable.’ Some may even use a proxy to hide their true identity. Find out how to see through the smokescreen and pin down the truly bad domains in this DNSDB webinar.

  • Farsight’s Newly Observed Domains (NOD)

    More than 70% of newly registered domains are malicious. But with Farsight Newley Observed Domains (NOD), you can block over 120,000 malicious domains from potentially penetrating your infrastructure with malicious malware every day.Download this infographic to learn more.

  • Introduction to DNSDB Part 1: Crawl

    Cheap, easy-to-obtain domain names, IP addresses and other DNS assets are helping to fuel today’s cybercrime, from spam and phishing to more sophisticated nation-state attacks. What can you do to stay protected? Jump into this webinar to learn how you can advance your threat intelligence and navigate roadblocks when using DNS in investigations.

  • IoT: The Next Wave of Cyber Threats

    Going hand-in-hand with digital transformations, the Internet of Things (IoT) and its connected devices present an attractive target to cybercriminals. Read the following infographic for an overview of common IoT attacks and best practices against them.

  • DNS Network Traffic Volumes During the 2020 Pandemic

    The pandemic has driven more people online than ever before. By reading this study, you can comprehend how traffic volumes for passive DNS cache miss traffic have changed since the outbreak of COVID-19. 316 online sites were used for this study, and these sites spanned across 5 categories: News, travel, retail, streaming and higher education.

  • Spotting a Denial-of-Service (DoS) Attack

    DoS attacks are an increasingly serious threat to today’s businesses, capable of rendering organizations virtually invisible online and cutting off interaction with customers. They can last for hours, days or even longer and cost organizations significant time, money and resources. View this infographic to see how to mitigate these attacks.

  • Farsight DNSDB Overview

    The internet is powered by the domain name system, also known as DNS. In this short video, learn about DNS and how Farsight Security’s DNSDB can help security professionals gain global DNS visibility.

  • The Anatomy of a Phishing Attack

    Access this infographic to dive into the anatomy of a phishing attack and how to protect your organization from these threats.

  • When Internet Traffic Takes a Wrong Turn

    IP hijacking is an emerging cyberthreat in which hackers modify public routing tables in order to direct online traffic along the hijacked route towards the attacker’s network. To learn more about this threat, including how to mitigate it, download this infographic.

  • Tax Scammers: Gone Phishing This Tax Season

    Each tax season, thousands of Americans are scammed out of millions of dollars. In fact, according to an FTC report, nearly 1 in 10 people were victims of imposter scams last year, amounting to roughly $667 million lost. The following white paper highlights common tax scams to watch out for (according to the IRS) and how to prepare for them.

  • Using Farsight Passive DNS

    For a hacker, the efficiency and ease-of-use of DNS-related phishing attacks is second to none. In fact, one Verizon study found phishing to be the #1 cause of data breaches. Download this white paper to learn more about Farsight’s Passive DNS tool, which embraces NIST’s 4-phase incident response lifecycle to help you thwart DNS-related threats.

  • DNS Dictionary

    In this dictionary, explore key terminology, abbreviations, and acronyms related to the Domain Name System.

  • Considerations for CuttingEdge Threat Intelligence & Incident Response

    The use of a cyberthreat intelligence team can greatly help organizations. Learn the best practices for team location and selection from expert Robert M. Lee.

  • Incident Response: Your How-To Guide

    As the rate of cybersecurity incidents grows, security teams are looking for all the help they can get to prevent, detect and respond to attacks. Incident response can help. Download this e-guide to learn how your organization can build an incident response framework, how and when to use incident response tools, and more.

  • Incident Response: Your How-To Guide

    As the rate of cybersecurity incidents grows, security teams are looking for all the help they can get to prevent, detect and respond to attacks. Incident response can help. Download this e-guide to learn how your organization can build an incident response framework, how and when to use incident response tools, and more.

  • Considerations for Developing a Cyber Threat Intelligence Team

    In this e-guide, explore the best practices for team location and selection when developing a cyberthreat intelligence team.

  • 5 Signs of Malicious Activity Your Organization May Be Overlooking

    If given even the smallest window of opportunity, cybercriminals will exploit any Internet service or infrastructure to support their campaigns. Security and IT admins play critical roles in monitoring networks for indicators of malicious activity. In this infographic, explore 5 signs of malicious activity your organization may be overlooking.

  • Discover Hidden Clues with Farsight

    Download this e-book to learn about Farsight DNSDB and how it enables threat intelligence teams, security analysts, and incident responders to search for specific hosts or subdomains within a suspicious domain and gain immediate insight into subdomains living under the base domain.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.