

For decades, perimeter-based security strategies have been the starting point for most cybersecurity programs. But in today’s cloud-based, mobile and remote work setting, that perimeter has all but dissolved. Learn how Proofpoint Insider Threat Management can help make your investigations more efficient, detailed...
Published: Dec 21, 2021


In this in-depth, review of the RSA NetWitness Platform, SANS explains in clear detail how the evolved SIEM works to address the cybersecurity talent shortage and accelerate threat detection and response. As part of the review, SANS simulated a cyberattack and used RSA NetWitness Platform to detect and investigate it....


Despite attempts to pivot from outdated security methodologies, legacy antivirus continues to fail in preventing security breaches on the endpoint. Although AV satisfies many regulatory, governance and compliance requirements by layering on multiple products, it saddles organizations with hidden costs while providing questionable...


We cannot anticipate change, although we can bet on its coming, be it from weather, pandemics, socio-political events or economic growth or decline. And we can be prepared to handle it when it does. Today, being ready for anything is mission-critical for all businesses, regardless of industry, size or location.
In...
Published: May 11, 2021


Cyber criminals do not just develop one attack and then abandon it after one use. Rather, they seek to make their software usable for as long as possible. Evasion techniques allow known threats to circumvent detection by security products.
Research indicates that cyber criminals perform their own testing and make...


The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks.


When evaluating any technology, it's essential to outline your primary use cases and success factors. This guide provides essential SIEM evaluation criteria, 'Pro Tips' and use cases, plus an overview of how AlienVault Unified Security Management (USM) meets each requirement.


As you move into 2015 endpoint security planning, prioritizing your initiatives can be time consuming. Last year analyst firm, Securosis, offered their thoughts on buying Endpoint Security Management solutions – including patching, configuration, device control and file integrity monitoring – which are increasingly...


If you don’t stop a distributed denial of service (DDoS) attack right away, your entire system could be compromised.
Access this concise guide that breaks down 10 steps to mitigating a DDoS attack as quickly as possible.


In this guide, you’ll learn more about phishing, why it has become such a widespread problem, and the negative impact that a phishing attack can have on your company and your customers. You’ll also learn how SSL and EV SSL technology can help protect your web site, your business, and ultimately your bottom...


This whitepaper presents best practice-based approaches recommended for minimizing cyber risk. These are arranged across five pillars and provide specific actions for each pillar to be performed by identifiable IT jobs.


As organistions move towards a more distributed workforce, the traditional perimeter of the office network is long gone. Changes in workforce dynamics have created a unique set of cybersecurity considerations where people are the new perimeter.
It’s more important than ever to build a people-centric insider...
Published: Apr 22, 2021


This technical paper is prepared from an interview with Senetas CTO Julian Fay, in which these topics are discussed and practical considerations given for using encryption on VPNs to enhance organizations’ data security.


In this report, Kaspersky Lab’s cybersecurity experts give you an insight into:
• How businesses can suffer from direct – and indirect – cyber-espionage attacks
• What you can do to protect your business… and its hard-won reputation
• How specific technologies can...