ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Chronicle

  • Who is GOSSIPGIRL?

    Flame (aka Flamer or sKyWIper) was the object of extensive research and fascination by the security community circa 2011. Flame proved to be one of the most daring threat actors ever discovered. This whitepaper investigates the connection between Flame and the O.G. threat actor super group, GOSSIPGIRL. Read on to learn more.

  • Abusing Code Signing for Profit

    Code signing was originally developed as way of guaranteeing the authenticity of a published file. However, given that this process is based on trust, it can be easily manipulated by skilled hackers. Download this white paper to unlock the results of a recent study into this issue and discover where the key concerns lie.

  • Redefining security analytics with Chronicle Backstory

    Today’s security teams face several challenges: from escalating threats and expanding networks and devices to the increased pressure of meeting security requirements. In this white paper, take a closer look at the 5 security requirements to include in your strategy and learn more about Chronicle’s Backstory data platform.

  • Case Study: Quanta Services

    In this case study, join James Stinson, VP of IT at Quanta Services, a skilled workforce contractor in North America, as he highlights the company’s journey towards cybersecurity and their partnership with Chronicle to establish a security analytics platform.

  • Chronicle Cybersecurity Predictions Crimeware, Cloud and Beyond

    Cyberattacks are inevitable, affecting business of any size across all industries. While tactics used by cybercriminals always changes, it remains certain that security teams will always be on the lookout for threats to their networks. In this white paper, explore cybersecurity predictions for 2020 to ensure your organization is prepared.

  • Winnti: More than just Windows and Gates

    Winnti malware has been around since 2013 and has been the source of several significant data breaches. Chronical researchers recently conduct a technical analysis to unravel several campaigns where Winnti malware was leveraged. Download this report to uncover the results of their study.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.