ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Farsight Security

  • Considerations for CuttingEdge Threat Intelligence & Incident Response

    The use of a cyberthreat intelligence team can greatly help organizations. Learn the best practices for team location and selection from expert Robert M. Lee.

  • Incident Response: Your How-To Guide

    As the rate of cybersecurity incidents grows, security teams are looking for all the help they can get to prevent, detect and respond to attacks. Incident response can help. Download this e-guide to learn how your organization can build an incident response framework, how and when to use incident response tools, and more.

  • Incident Response: Your How-To Guide

    As the rate of cybersecurity incidents grows, security teams are looking for all the help they can get to prevent, detect and respond to attacks. Incident response can help. Download this e-guide to learn how your organization can build an incident response framework, how and when to use incident response tools, and more.

  • Considerations for Developing a Cyber Threat Intelligence Team

    In this e-guide, explore the best practices for team location and selection when developing a cyberthreat intelligence team.

  • 5 Signs of Malicious Activity Your Organization May Be Overlooking

    If given even the smallest window of opportunity, cybercriminals will exploit any Internet service or infrastructure to support their campaigns. Security and IT admins play critical roles in monitoring networks for indicators of malicious activity. In this infographic, explore 5 signs of malicious activity your organization may be overlooking.

  • Discover Hidden Clues with Farsight

    Download this e-book to learn about Farsight DNSDB and how it enables threat intelligence teams, security analysts, and incident responders to search for specific hosts or subdomains within a suspicious domain and gain immediate insight into subdomains living under the base domain.

  • Global Internationalized Domain Name Homograph Report

    Internationalized Domain Names (IDNs) are often abused by cybercriminals to conduct malicious activities, such as phishing or malware distribution. In this new research report, Farsight Security Global Internationalized Domain Name Homograph Report, examine the prevalence and distribution of IDN homographs across the Internet.

  • Everything Starts with DNS: Making the Internet a Safer Place

    During an investigation into potential cybercriminal activity, there's usually a domain or IP address that serves as your starting point. Find out how to use the world's largest real-time and historical DNS intelligence database to bring new levels of insight to your investigation.

  • How ThreatConnect Leverages DNSDB to Track Down Grizzly Steppe

    Find out how ThreatConnect used a passive DNS database intelligence approach to extend Grizzly Steppe data from the Joint Analysis Report and discover new indicators that expose cyberespionage activity.

  • Global DNS Defense Report

    Explore this report to learn about DNS protection technology adoption trends and find out how you can bolster your network's defense against pervasive threats like phishing attacks.

  • Passive DNS for Threat Intelligence

    This technology overview explores how real-time and historical passive DNS data allows security analysts to enrich and refine existing threat data to transform threat feeds into actionable, relevant threat intelligence.

  • Spear Phishing: The #1 Threat

    Find out how you can combat spear phishing with a Newly Observed Domains (NOD) platform that integrates with your company's DNS to help you identify all new domains, assess potential threats, and prevent attacks from infiltrating your systems.

  • Identifying the Timeline Activities of a Cyber Breach

    In this case study discover how the use of DNSDB in mapping malicious and benign infrastructure revealed the timeline and activity of a breach of the Anthem Healthcare System.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.