All resources sponsored by:

DomainTools

19 Matches
2020 SANS Cyber Threat Intelligence (CTI) Survey
sponsored by DomainTools
ANALYST REPORT:As the field of Cyber Threat Intelligence (CTI) settles into its new maturity in 2020, understanding and improving the effectiveness of CTI programs will become even more critical. Download the 2020 SANS Cyber Threat Intelligence (CTI) Survey for key findings and takeaways from over 1,000 organizations on effectiveness of their CTI programs.
Posted: 24 Mar 2020 | Published: 24 Mar 2020
Get This Now


The 2020 Study on Staffing the IT Security Function in the Age of Automation
sponsored by DomainTools
WHITE PAPER:Automation is growing in popularity amongst IT security teams – offloading certain tasks in order to reduce workload and enhance productivity. In this report, discover the results of a Ponemon Institute study into the relationship between IT security staffing and automation.
Posted: 24 Mar 2020 | Published: 29 Feb 2020
Get This Now


Hunting Remote Access Trojans
sponsored by DomainTools
WHITE PAPER:While cybersecurity pros don’t have the legal rights to “hack back”, they can learn what new controls are required, even before a threat actor envisions their new tool, technique or procedure. In this hunting guide, discover ways you can seek out threats using threat investigation tools.
Posted: 06 Feb 2020 | Published: 06 Feb 2020
Get This Now


SOAR Buyer’s Guide
sponsored by DomainTools
WHITE PAPER:Many security teams are using SOAR platforms to operationalize threat intelligence. But not all security solutions are created equal and it’s important that all internal factors are taken into consideration when opting for one security solution over another. Dive into the SOAR Buyer’s Guide for everything you should consider.
Posted: 06 Feb 2020 | Published: 06 Feb 2020
Get This Now


How a Fortune 15 Technology Enterprise Proactively Detects Advanced Threats With DomainTools
sponsored by DomainTools
CASE STUDY:A Fortune 15 multinational technology company needed to identify malicious and copycat domains that might be used as a future attack vector against their infrastructure. In this case study, see how DomainTools allowed them to accelerate identification and response to potential domain-based threats, and much more.
Posted: 05 Feb 2020 | Published: 05 Feb 2020
Get This Now


The Value of Threat Intelligence
sponsored by DomainTools
WHITE PAPER:With over 80% of organizations reporting 1 or more security incidents over the past year, it’s safe to say that security issues are common. This study shows that while most organizations can defend against malware attacks, they fail against most other threats. Read on to view the results of Osterman’s study into the value of threat intelligence.
Posted: 05 Feb 2020 | Published: 30 Nov 2019
Get This Now


Cyber Threat Intelligence
sponsored by DomainTools
RESOURCE:As cyberattacks become more sophisticated and difficult to detect, proactive approaches to threat management are no longer viable for ensuring network security. In this solution brief, discover a proactive approach to threat intelligence that helps you identify & monitor threats while building a cyber threat database.
Posted: 04 Feb 2020 | Published: 04 Feb 2020
Get This Now


2019 Cybersecurity Report Card
sponsored by DomainTools
WHITE PAPER:If you only pay attention to the massive data breaches that make headlines, it’s easy to draw the conclusion that cybersecurity is in a state of constant failure. However, there is enough going on behind the scenes to inspire confidence. Download this Cybersecurity Report Card to see how organizations rate their security posture.
Posted: 04 Feb 2020 | Published: 04 Feb 2020
Get This Now


Detecting Malicious Domains Using Artificial Intelligence and Machine Learning
sponsored by DomainTools
WHITE PAPER:As cybercriminals deploy more sophisticated attack methods to avoid detection, organizations need to ensure their security tactics can evolve at the pace of these threats. Download this white paper to take a closer look at how machine learning & AI can bolster your security by detecting malicious activity across various domains.
Posted: 03 Feb 2020 | Published: 03 Feb 2020
Get This Now


SIEM Buyer’s Guide
sponsored by DomainTools
WHITE PAPER:SIEM programs have become a critical part of the way organizations are able to monitor their network and mitigate potential risks. Is your organization interested in SIEM? Download this buyer’s guide and take a closer look at what defines SIEM, who uses it and an evaluation checklist for selecting the right solution.
Posted: 03 Feb 2020 | Published: 03 Feb 2020
Get This Now


Government Agency Embraces Domain Intelligence to Pre-emptively Block Threats
sponsored by DomainTools
CASE STUDY:In this case study, discover how a major metropolitan government agency was able to incorporate a platform that enabled them to anticipate & block threats before they breach the perimeter and utilize their existing data to improve their collective intelligence to optimize IT resources. Download the report to take a closer look.
Posted: 31 Jan 2020 | Published: 31 Jan 2020
Get This Now


SANS 2019 Threat Hunting Survey: The Differing Needs of Hunters
sponsored by DomainTools
WHITE PAPER:In this year’s SANS Threat Hunting Survey, explore how threat hunting teams are tasked in an environment, where they hunt & how they hunt. The results of the study provide several key takeaways and action items to consider adopting for your hunting program. Download the report to unlock the insights.
Posted: 31 Jan 2020 | Published: 31 Oct 2019
Get This Now


Precisely Target Alerts and Hunt Threats Across Your Enterprise with DomainTools and Splunk
sponsored by DomainTools
DATA SHEET:In this product overview, see how DomainTools enables SOCs and security analysts to take indicators from their network, including domains and IPs, and connect them with active domains on the Internet.
Posted: 30 Jan 2020 | Published: 30 Jan 2020
Get This Now


Strategies to Vet Your Threat Intelligence and Reduce False Positives
sponsored by DomainTools
WHITE PAPER:This paper discusses detection strategies to reduce false positives, and models that improve threat hunting and investigations outcomes. Also uncover leading tools that help teams make the most of their limited time and resources.
Posted: 30 Jan 2020 | Published: 30 Jan 2020
Get This Now


DomainTools Guide to Threat Hunting with Splunk and Phantom
sponsored by DomainTools
WEBCAST:Threat hunting is a hypothesis driven approach to validating the collection, detection and analysis of data ahead of an incident. The first step to integrating threat hunting into your organization is establishing a true threat hunting program. In this webcast, learn about a number of threat hunting essentials.
Posted: 14 Jan 2019 | Premiered: Jan 14, 2019
Get This Now


The Beginner's Guide to Threat Hunting
sponsored by DomainTools
WEBCAST:Threat hunting is a hypothesis driven approach to validating the collection, detection and analysis of data ahead of an incident. It is important to establish a threat hunting process to have for reference before any possible incidents. In this webcast, learn about the key steps to creating a threat hunting process.
Posted: 11 Jan 2019 | Premiered: Dec 31, 2018
Get This Now


SANS Fingerprinting Threat Actors with Web Assets
sponsored by DomainTools
WEBCAST:Threat intelligence helps companies better predict the actions of threat actors to stay ahead of their attacks. In order to do this, organizations must learn more about the enemy. In this webcast, SANS instructor Rebekah Brown and Data Systems Engineer at DomainTools, Mike Thompson discuss ways to better fingerprint threat actors.
Posted: 11 Jan 2019 | Premiered: May 31, 2018
Get This Now


How To Analyze and Investigate Malicious Javascript Attacks
sponsored by DomainTools
WEBCAST:The increased frequency of JavaScript attacks creates big problems when trying to protect your users. JavaScript is the top language running on the web with 80% of the top 1 million sites using it in some capacity. In this webcast, Tarik Saleh, Keith Hoodlet and Paul Asadoorian will show you several different forms of malicious JavaScript.
Posted: 10 Jan 2019 | Premiered: Jan 10, 2019
Get This Now


The Beginner's Guide to Mitigating Phishing Attacks
sponsored by DomainTools
WEBCAST:Phishings attacks are a common form of fraud that is most commonly done by disguising malicious links to distribute malware. In this webcast, Corin Imani, Senior Security Advisor at DomianTools discusses real world examples, the steps to executing a phishing attack and ways to remediate a phishing attack.
Posted: 10 Jan 2019 | Premiered: Jan 10, 2019
Get This Now


19 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info