IT Management  >   Systems Operations  >   Security  >  

Day Zero Threats

RSS Feed   
Day Zero Threats White Papers (View All Report Types)
 
Succeeding at the Intersection of Security and Privacy
sponsored by Virtru
WHITE PAPER: This white paper covers the intersection of the security and privacy industries, incorporating how privacy laws, cybersecurity challenges and increased attention have affected the crossover of these spaces. Read on to learn more.
Posted: 03 Sep 2019 | Published: 03 Sep 2019

Virtru

How Midsize Enterprises are Tackling Cyberthreat Challenges
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: The small to midsize enterprise (SME) segment may not make the top headlines when it comes to cyberattacks, but that doesn't mean these organizations have it any easier than their large enterprise counterparts. Read on for actionable insights into how peer organizations in this segment are tackling cyberthreat challenges.
Posted: 07 Aug 2019 | Published: 07 Aug 2019

Arctic Wolf Networks, Inc.

Using MITRE ATT&CK in Threat Hunting and Detection
sponsored by LogRhythm, Inc.
WHITE PAPER: ATT&CK can be used in many different ways to improve cybersecurity efforts. This white paper focuses on how you can use ATT&CK to enhance, analyze and test your threat detection efforts. Download this white paper to learn how you can ensure comprehensive, up-to-date, and verifiable threat detection.
Posted: 10 Sep 2019 | Published: 10 Sep 2019

LogRhythm, Inc.

Artificial Intelligence: The Smarter Approach To Information Security
sponsored by Blackberry Cylance
WHITE PAPER: The news headlines are replete with stories of devastating data breaches, compromising the data of millions. Traditional AV solutions are ineffective at preventing breaches. In this white paper, learn how an AI-driven security solution can help your organization combat cyber attacks.
Posted: 20 Sep 2019 | Published: 20 Sep 2019

Blackberry Cylance

The 4 Types of Threat Detection
sponsored by Dragos
WHITE PAPER: Threat detection comprises 1 of the 3 core cybersecurity functions along with prevention and response. But, detection plays an outsized role as arguably the most important cybersecurity function in an "assume breach" world. In this white paper, explore the 4 types of threat detection, how they are derived and the uses for each.
Posted: 01 Aug 2019 | Published: 13 Jul 2018

Dragos

Cyber Insecurity: Managing Threats from Within
sponsored by Proofpoint
WHITE PAPER: Data breaches are having increasingly disastrous consequences for business. Explore the frequency and severity of people-centric data breaches in this Cyber Insecurity: Managing Threats from Within white paper.
Posted: 09 Oct 2019 | Published: 09 Oct 2019

Proofpoint

Faster Response with Crowdstrike and MITRE ATT&CK
sponsored by CrowdStrike
WHITE PAPER: As responders often lack the time and resources to investigate every alert, or even prioritize the most critical ones, a high-risk threat might go unnoticed. Potentially, this could allow devastating breaches to occur. In this white paper, learn how adopting the common industry framework MITRE ATT&CK can solve this challenge.
Posted: 24 Jul 2019 | Published: 24 Jul 2019

CrowdStrike

Observations From the Front Lines of Threat Hunting
sponsored by Crowdstrike
WHITE PAPER: This mid-year report provides a summary of OverWatch’s threat hunting findings from the first half of 2019. Download now to review intrusion trends during that time frame, insights into the current landscape of adversary tactics and delivers highlights of notable intrusions OverWatch identified.
Posted: 11 Oct 2019 | Published: 11 Oct 2019


Protecting Your IT Assets from Cryptomining Malware
sponsored by Neustar
WHITE PAPER: Cryptomining malware has exploded on the threat landscape, becoming one of the most common malware attacks and posing a significant risk to your IT assets. In this white paper learn everything you need to know about cryptomining including what it does, how it gets in, and how to recognize and prevent it.
Posted: 30 Jul 2019 | Published: 19 Jul 2019

Neustar

Securing Your Modern Network with AWS and Cisco Stealthwatch Cloud
sponsored by Amazon Web Services
WHITE PAPER: The security of the network, which was always important to the network admin, has become a top priority. However, you can’t fix what you can’t see. In this white paper learn how Stealthwatch Cloud can help you to see your network activity, identify the signs of potential threats, and more.
Posted: 08 Oct 2019 | Published: 08 Oct 2019

Amazon Web Services
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement