All resources sponsored by:

Chronicle

7 Matches
Who is GOSSIPGIRL? Revisiting the O.G. threat actor supergroup
sponsored by Chronicle
WHITE PAPER:Flame (aka Flamer or sKyWIper) was the object of extensive research and fascination by the security community circa 2011. Flame proved to be one of the most daring threat actors ever discovered. This whitepaper investigates the connection between Flame and the O.G. threat actor super group, GOSSIPGIRL. Read on to learn more.
Posted: 21 May 2020 | Published: 21 May 2020
Get This Now


Abusing code signing for profit
sponsored by Chronicle
WHITE PAPER:Cryptographically signing a piece of code is built on a problematic core tenet: Trust. This inherited trust model is taken advantage of by malware authors who purchase certificates directly or via resellers. Download this white paper to see what Chronicle researchers found when digging into this issue.
Posted: 21 May 2020 | Published: 21 May 2020
Get This Now


Company Profile: Global Healthcare Industry Leader
sponsored by Chronicle
CASE STUDY:In this case study learn how a US based healthcare sector market leader was able to combat their security analytics challenges with Chronicle’s platform.
Posted: 20 May 2020 | Published: 20 May 2020
Get This Now


Winnti: More than just Windows and Gates
sponsored by Chronicle
WHITE PAPER:While reviewing a report of a Winnti malware intrusion at a Vietnamese gaming company, Chronicle researchers identified a small cluster of Winnti samples designed specifically for Linux. Download this white paper for a technical analysis of this variant.
Posted: 20 May 2020 | Published: 20 May 2020
Get This Now


Redefining Security Analytics with Chronicle
sponsored by Chronicle
WHITE PAPER:Historically, most analysis and complex detection capabilities have been bundled together into a technology called a “SIEM.” In this Google Cloud Whitepaper, take an in-depth look at Chronicle’s global security telemetry platform, designed as the answer to the question: What would SIEM look like if it were invented today?
Posted: 19 May 2020 | Published: 19 May 2020
Get This Now


YARA-L: A New Detection Language for Modern Threats
sponsored by Chronicle
WHITE PAPER:When it comes to threat detection and incident investigation, most organizations turn to SIEM, SOAR or another similar approach for analyzing security data. However, analyzing data is made more challenging by the increasing amount being generated. In this white paper, learn more about YARA-L, a new detection language for analyzing threat data.
Posted: 07 May 2020 | Published: 07 May 2020
Get This Now


Case study: Quanta Services
sponsored by Chronicle
CASE STUDY:In this case study, learn how Quanta Services, the leading specialty contractor with the largest and highly trained skilled workforce in North America, uses Chronicle’s security analytics platform to help focus their security analysts on high-quality work instead of spending time digging through mountains of data.
Posted: 06 May 2020 | Published: 06 May 2020
Get This Now

TOPICS:  Security

7 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info