Intrusion Prevention Research
-
Building a High-Speed SOC
Sponsored by: VMware International Unlimited Company87% of organizations today feel it’s difficult to recruit and hire cybersecurity talent. The effects of this skills gap are obvious: security teams will be unable to keep pace with the growing volume of threats. In this white paper, discover how the right balance of skilled workers, processes and technology can produce an effective SOC.
-
Hunt Like a Pro: A Threat Hunting Guide
Sponsored by: VMware International Unlimited CompanyThreat hunting is a proactive process of scanning the network for potential threats, isolating them and thwarting the malicious behavior before it gets a chance to spread. The goal is to tilt the advantage from the attacker back to the defender. Read this white paper to uncover the best practices necessary to get started hunting threats.
-
VMware Carbon Black Cloud Enterprise EDR
Sponsored by: VMware International Unlimited CompanyIn this datasheet, explore the key features and capabilities of VMware Carbon Black Enterprise EDR, designed to deliver continuous visibility for top security operations centers (SOCs) and incident response (IR) teams as they hunt for threats.
-
VMware Carbon Black Cloud Managed Detection Monitoring and Alert Triage
Sponsored by: VMware International Unlimited CompanyToday’s security teams are often understaffed and spend too much of their time on tedious, manual tasks. This prevents them from tending to other security areas and slows threat response. In this data sheet, explore VMware Carbon Black Cloud Managed Detection, designed to help by automating some of these tasks. Read on to learn more.
-
Advantage, Network Metadata: How to Enhance Efficiency in Incident Investigations Without PCAP
Sponsored by: GigamonFor a long time network security teams have relied on using packet captures (PCAPs) as the go-to approach for incident investigation. Yet, PCAP can be slow, labor intensive and inefficient. Read this new technology brief and discover how to enhance investigation efficiency without using PCAP by leveraging the advantages of metadata capture.
-
Next-Gen Intrusion Detection: Complementing Perimeter Protection to Secure the Virtual Attack Surface
Sponsored by: AccedianLearn about next-gen IDS technology and how it adds another layer of protection to the enterprise SecOps arsenal to not only protect against illicit network intrusions and behaviors, but to implement active measures to catch cybercriminals in the act.
-
2019 Crowdstrike Global Security Attitude Survey
Sponsored by: CrowdStrikeIn today’s threat landscape, cyberattacks are unavoidable. The best way to address threats is to establish an incident response plan. This report takes a closer look at the 1:10:60 rule for measuring the effectiveness of your response plan and explores the results of a recent study into the current state of cybersecurity capabilities.
-
Building a Strong and Effective Incident Response Plan
Sponsored by: ServiceNowLiterally every business -- both large and small and across every industry -- is a target for criminal hackers and careless employees alike. The question is: What are you doing about it? This is where incident response comes into play. In this e-guide, learn how to create an effective incident response plan.
-
The Benefits of Automating Security with SOAR Tools
Sponsored by: ServiceNowSecurity professionals are struggling to keep up with today's threat landscape as they continue to deal with security alert overload and the cybersecurity skills shortage. However, deploying SOAR tools can aid security teams with improving everyday processes. In this e-guide, learn how SOAR tools can improve your cybersecurity program.
-
How to Improve Your Security Incident Response Process
Sponsored by: ServiceNowNearly every day there's a new headline about one high-profile data breach or another. But there are many more incidents that go unnoticed because organizations don't know how to detect them. In this e-guide, learn how to detect key symptoms that signal a problem. Also, explore tips to help you better respond to these incidents.
-
Incident Response: Your How-To Guide
Sponsored by: Farsight SecurityAs the rate of cybersecurity incidents grows, security teams are looking for all the help they can get to prevent, detect and respond to attacks. Incident response can help. Download this e-guide to learn how your organization can build an incident response framework, how and when to use incident response tools, and more.
-
A Look Inside Financially Motivated Attacks and the Active FIN8 Threat Group
Sponsored by: GigamonDownload this report to explore a detailed view into the inner workings of financially motivated threat actor groups, including their preferred tactics and tools. Gaining an understanding of the anatomy of these attacks can help your team to improve visibility into the threats and expedite rapid detection and response.
-
Security Analytics for Threat Detection and Breach Resolution in 2019
Sponsored by: GigamonWhile there is no security silver bullet, security analytics is a great step forward for any organization to improve its ability to detect threats. In this white paper, explore the top 4 considerations for investigating a security analytics tool.
-
Faster Response with Crowdstrike and MITRE ATT&CK
Sponsored by: CrowdstrikeAs responders often lack the time and resources to investigate every alert, or even prioritize the most critical ones, a high-risk threat might go unnoticed. Potentially, this could allow devastating breaches to occur. In this white paper, learn how adopting the common industry framework MITRE ATT&CK can solve this challenge.
-
Explore the ROI of CylancePROTECT and CylanceOPTICS
Sponsored by: BlackBerryTo protect endpoints, servers, and cloud workloads, CylancePROTECT and CylanceOPTICS provide an AI-driven threat prevention, detection, and response platform. In this Forrester Total Economic Impact study, examine the potential ROI enterprises realize after deploying these Cylance platforms.
-
4 Reasons to Add UBA to Your SIEM
Sponsored by: SplunkTo combat threats, organizations traditionally have turned to SIEMs. However, more sophisticated use cases require a machine learning-powered solution. This is where user and entity behavior analytics (UEBA) can prove to be an invaluable addition to your SIEM. In this white paper, learn about 4 reasons to add UEBA to your SIEM.
-
What to Look for in an MDR Provider
Sponsored by: Dell SecureWorksThere are plenty of security providers offering Managed Detection and Response (MDR) solutions, but it is important to ensure they offer capabilities that match your business's needs. In this white paper, learn 5 key areas organizations should investigate when evaluating and selecting an MDR provider.
-
Operationalizing Threat Intelligence Using Splunk Enterprise Security
Sponsored by: SplunkExplore the challenges and requirements of implementing high-coverage threat intelligence, and how your organization can achieve operational maturity.
-
How to Prevent Cloud Cryptojacking Attacks on your Enterprise
Sponsored by: Cisco UmbrellaCloud cryptojacking attacks are a newer threat targeting enterprises. Cybersecurity expert Rob Shapland – an ethical hacker who specializes in simulating advanced cyberattacks against corporate networks – explains what safeguards you should have in place to prevent these attacks.
-
Cisco ASA 5500 Series Adaptive Security Appliances
Sponsored by: Cisco Systems, Inc.Cisco ASA 5500 Series Adaptive Security Appliances are purpose-built solutions that integrate world-class firewall, unified communications security, VPN, intrusion prevention (IPS), and content security services in a unified platform. Download this paper for further technical details.
-
The Future of Security: Advanced Security Analytics
Sponsored by: LogRhythm, Inc.As security attacks have grown in numbers and complexity over the past few years, security efforts have evolved in the same measure. Advanced security analytics is the next step in cybersecurity. Learn how to shift from a reactive to a proactive approach and what the future of security holds.
-
Information Security Asean July 2016
Sponsored by: SearchSecurity.comIn April, the Philippines suffered its worst-ever government data breach, when personal information, including fingerprint data and passport information, belonging to around 70 million people, were compromised.
-
Information Security ANZ July 2016
Sponsored by: SearchSecurity.comAustralia's $230m security strategy serves as a wake-up call to enterprises about the need to take the issue much more seriously.
-
Information Security ANZ March 2016
Sponsored by: TechTarget ANZAustralian organisations face a huge skills shortage when it comes to fighting cyber-crime unless they act quickly
-
Information Security ANZ July 2015
Sponsored by: TechTarget ANZAnalysts and security experts discuss the current risk factors in the ANZ region.