All resources sponsored by:

DomainTools

19 Matches
2021 The Impact of Solarwinds Breach on Cybersecurity
sponsored by DomainTools
RESEARCH CONTENT:The infamous Russian supply chain attack has had devastating and long-lasting impacts that have cast a near-universal fear across security pros. This report highlights the results of a recent study designed to better understand the direct, indirect and other impacts in the wake of the biggest hack of the US government – read on to get started.
Posted: 22 Mar 2021 | Published: 22 Mar 2021
Get This Now

TOPICS:  Cybersecurity

2021 Threat Hunting Report
sponsored by DomainTools
RESEARCH CONTENT:In 2021, Cybersecurity Insiders conducted the fourth annual threat hunting research project to gain deeper insights into the maturity and evolution of the security practice. Download the report to uncover the results.
Posted: 22 Mar 2021 | Published: 22 Mar 2021
Get This Now


2021 Cyber Threat Intelligence Survey
sponsored by DomainTools
ANALYST REPORT:Are you or other members of your organization looking to gain a greater understanding of bad actors and their efforts? Investigate the 2021 SANS Cyber Threat Intelligence Survey, which examines the capabilities, opportunities and intent of adversaries conducting cyber operations.
Posted: 27 Jan 2021 | Published: 27 Jan 2021
Get This Now


2020 Threat Hunting Survey Results
sponsored by DomainTools
RESEARCH CONTENT:Each year, SANS conducts a Threat Hunting Survey to better understand the threat hunting landscape and how security professionals are conducting threat hunting in their organizations – read on to unlock the results from this year’s survey.
Posted: 18 Dec 2020 | Published: 18 Dec 2020
Get This Now


Cybersecurity Report Card for 2020
sponsored by DomainTools
RESEARCH CONTENT:The past year has been extremely stressful for cybersecurity professionals – having to shift and enable a massive population of remote workers while dealing with the growing volume and severity of emerging cyberthreats. Read on to discover the results of the Cybersecurity Report Card Survey, where organizations rate how they handled 2020.
Posted: 18 Dec 2020 | Published: 18 Dec 2020
Get This Now


Threat Hunting Report
sponsored by DomainTools
RESEARCH CONTENT:Threat hunting is becoming the gold standard for addressing today’s increasingly disruptive cyberthreats – in fact, 93% of organizations agree that threat hunting should be a top security priority. Read this 2020 Threat Hunting Report for more insights and best practices as they related to the current state of threat hunting.
Posted: 17 Dec 2020 | Published: 17 Dec 2020
Get This Now


The 2020 Study on Staffing the IT Security Function in the Age of Automation
sponsored by DomainTools
WHITE PAPER:Automation is growing in popularity amongst IT security teams – offloading certain tasks in order to reduce workload and enhance productivity. In this report, discover the results of a Ponemon Institute study into the relationship between IT security staffing and automation.
Posted: 24 Mar 2020 | Published: 29 Feb 2020
Get This Now


Hunting Remote Access Trojans
sponsored by DomainTools
WHITE PAPER:While cybersecurity pros don’t have the legal rights to “hack back”, they can learn what new controls are required, even before a threat actor envisions their new tool, technique or procedure. In this hunting guide, discover ways you can seek out threats using threat investigation tools.
Posted: 06 Feb 2020 | Published: 06 Feb 2020
Get This Now


SOAR Buyer’s Guide
sponsored by DomainTools
WHITE PAPER:Many security teams are using SOAR platforms to operationalize threat intelligence. But not all security solutions are created equal and it’s important that all internal factors are taken into consideration when opting for one security solution over another. Dive into the SOAR Buyer’s Guide for everything you should consider.
Posted: 06 Feb 2020 | Published: 06 Feb 2020
Get This Now


How a Fortune 15 Technology Enterprise Proactively Detects Advanced Threats With DomainTools
sponsored by DomainTools
CASE STUDY:A Fortune 15 multinational technology company needed to identify malicious and copycat domains that might be used as a future attack vector against their infrastructure. In this case study, see how DomainTools allowed them to accelerate identification and response to potential domain-based threats, and much more.
Posted: 05 Feb 2020 | Published: 05 Feb 2020
Get This Now


The Value of Threat Intelligence
sponsored by DomainTools
WHITE PAPER:With over 80% of organizations reporting 1 or more security incidents over the past year, it’s safe to say that security issues are common. This study shows that while most organizations can defend against malware attacks, they fail against most other threats. Read on to view the results of Osterman’s study into the value of threat intelligence.
Posted: 05 Feb 2020 | Published: 30 Nov 2019
Get This Now


Cyber Threat Intelligence
sponsored by DomainTools
RESOURCE:As cyberattacks become more sophisticated and difficult to detect, proactive approaches to threat management are no longer viable for ensuring network security. In this solution brief, discover a proactive approach to threat intelligence that helps you identify & monitor threats while building a cyber threat database.
Posted: 04 Feb 2020 | Published: 04 Feb 2020
Get This Now


Detecting Malicious Domains Using Artificial Intelligence and Machine Learning
sponsored by DomainTools
WHITE PAPER:As cybercriminals deploy more sophisticated attack methods to avoid detection, organizations need to ensure their security tactics can evolve at the pace of these threats. Download this white paper to take a closer look at how machine learning & AI can bolster your security by detecting malicious activity across various domains.
Posted: 03 Feb 2020 | Published: 03 Feb 2020
Get This Now


SIEM Buyer’s Guide
sponsored by DomainTools
WHITE PAPER:SIEM programs have become a critical part of the way organizations are able to monitor their network and mitigate potential risks. Is your organization interested in SIEM? Download this buyer’s guide and take a closer look at what defines SIEM, who uses it and an evaluation checklist for selecting the right solution.
Posted: 03 Feb 2020 | Published: 03 Feb 2020
Get This Now


Government Agency Embraces Domain Intelligence to Pre-emptively Block Threats
sponsored by DomainTools
CASE STUDY:In this case study, discover how a major metropolitan government agency was able to incorporate a platform that enabled them to anticipate & block threats before they breach the perimeter and utilize their existing data to improve their collective intelligence to optimize IT resources. Download the report to take a closer look.
Posted: 31 Jan 2020 | Published: 31 Jan 2020
Get This Now


Precisely Target Alerts and Hunt Threats Across Your Enterprise with DomainTools and Splunk
sponsored by DomainTools
DATA SHEET:In this product overview, see how DomainTools enables SOCs and security analysts to take indicators from their network, including domains and IPs, and connect them with active domains on the Internet.
Posted: 30 Jan 2020 | Published: 30 Jan 2020
Get This Now


Strategies to Vet Your Threat Intelligence and Reduce False Positives
sponsored by DomainTools
WHITE PAPER:This paper discusses detection strategies to reduce false positives, and models that improve threat hunting and investigations outcomes. Also uncover leading tools that help teams make the most of their limited time and resources.
Posted: 30 Jan 2020 | Published: 30 Jan 2020
Get This Now


DomainTools Guide to Threat Hunting with Splunk and Phantom
sponsored by DomainTools
WEBCAST:Threat hunting is a hypothesis driven approach to validating the collection, detection and analysis of data ahead of an incident. The first step to integrating threat hunting into your organization is establishing a true threat hunting program. In this webcast, learn about a number of threat hunting essentials.
Posted: 14 Jan 2019 | Premiered: Jan 14, 2019
Get This Now


The Beginner's Guide to Threat Hunting
sponsored by DomainTools
WEBCAST:Threat hunting is a hypothesis driven approach to validating the collection, detection and analysis of data ahead of an incident. It is important to establish a threat hunting process to have for reference before any possible incidents. In this webcast, learn about the key steps to creating a threat hunting process.
Posted: 11 Jan 2019 | Premiered: Dec 31, 2018
Get This Now


19 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences