Hunting Industry Reports

Beginner's guide to Internet of Things
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The adoption of IoT in Asia-Pacific has accelerated over the past few years, spurred by growing digitalisation across the region and the desire to improve business processes. In this e-guide, learn more about IoT developments across the region and how to leverage the technology to drive business outcomes.
Posted: 15 Feb 2023 | Published: 16 Feb 2023

TechTarget ComputerWeekly.com

Sun World International: A case study in smarter planet leadership
sponsored by IBM
CASE STUDY: This case study illustrates how Sun World International, a mid-sized grower in California, shifted its competitive strategy to capitalize on analytics and gain real-time insight into the competitive market. Learn how it gained a 5% reduction in harvesting costs, a 20% reduction in fuel usage and an eight-fold increase in profit per acre.
Posted: 22 May 2012 | Published: 22 May 2012

IBM

CW EMEA – February 2023: Kyiv is ready for anything
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue of CW EMEA, the CIO at Kyiv City Council explains how its IT team has kept services running for residents amid relentless bombing by Russia. We also look at the Netherlands’ plans to regulate AI to reduce bias, how highly accurate time protocols ensure fair trading, and the use of tech in agriculture in Denmark. Read the issue now.
Posted: 02 Feb 2023 | Published: 09 Feb 2023

TechTarget ComputerWeekly.com

Computer Weekly – 26 January 2021: 'Salad as a service' – how tech could revolutionise farming
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how new technologies are supporting the rise of vertical farming, and could revolutionise food supply chains. We examine one of the biggest trends in the cloud – serverless computing. And Brexit has not yet ended the debate about UK-EU data protection. Read the issue now.
Posted: 08 Feb 2021 | Published: 26 Jan 2021

TechTarget ComputerWeekly.com

Computer Weekly – 20 March 2018: Where neuroscience meets technology
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how computer scientists are using data, cloud and virtual reality to understand the brain and improve mental wellbeing. We analyse newly published government documents detailing the early problems with Universal Credit. And we look at how AI can help improve cyber security. Read the issue now.
Posted: 08 Feb 2021 | Published: 16 Mar 2018

TechTarget ComputerWeekly.com

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

2023 Threat Hunting Report
sponsored by CrowdStrike
ANALYST REPORT: The problem isn't malware — it's adversaries. To stop these adversaries, security teams must understand how they operate. In the 2023 Threat Hunting Report, CrowdStrike's Counter Adversary Operations team exposes the latest adversary tradecraft and provides knowledge and insights to help stop breaches.
Posted: 16 Sep 2023 | Published: 16 Sep 2023

TOPICS:  .NET
CrowdStrike

How to Become a Threat Hunter
sponsored by Cisco Systems Inc.
EGUIDE: Much of hunting is instinct, and when it comes to hunting cyberthreats, it’s no different. Threat hunters are good at what do because they aren’t as ‘by-the-book’ as other professionals. But they do have a set of learnable skills that make them successful. Download this e-guide featuring Gartner analyst John Collins to know what these skills are.
Posted: 14 Apr 2021 | Published: 07 Apr 2021

Cisco Systems Inc.

Information Security Magazine – The Hunt for Data Analytics
sponsored by TechTarget Security
EZINE: Big data and analytics show promise for better threat detection. Should these technologies be combined with SIEM products, or is it time to move beyond these high alert systems?
Posted: 02 Mar 2015 | Published: 02 Mar 2015

TechTarget Security

Explore the Threat Hunting Process
sponsored by TechTarget Security
EZINE: The threat hunting process hinges on an expert's ability to create hypotheses and to hunt for patterns and indicators of compromise in data-driven networks. In this issues of Information Security, explore learn how threat hunting programs can find security holes that machine learning or automated systems fail to detect.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

TechTarget Security

Allure of the threat hunter draws companies large and small
sponsored by TechTarget Security
EZINE: Do you need a threat hunter on your analyst team? Threat hunting allows companies to be proactive, rather than wait for attackers to trigger alarms after they have already infiltrated an organization's systems. Yet not every company is ready to employ threat hunting techniques.
Posted: 29 Nov 2018 | Published: 29 Nov 2018

TechTarget Security

Boosting Your Multi-cloud Security
sponsored by Obrela
EGUIDE: Protecting one cloud environment is challenging enough. But, when you have a multi-cloud infrastructure to defend from evolving threats, the task becomes even more complex. Fortunately, there are strategies that you can employ to boost your security, like multi-cloud threat hunting and SOCaaS. Read this E-Guide to delve into these topics and more.
Posted: 13 Mar 2023 | Published: 09 Mar 2023

TOPICS:  .NET
Obrela

Building the foundation of a mature threat hunting program
sponsored by Tanium
EBOOK: Many of today’s organizations are at the mercy of their third-party partners’ security as well as their own. Read this e-book, Building the Foundation of a Mature Threat Hunting Program, to learn effective hunting strategies and how to address critical visibility and data gaps.
Posted: 09 Feb 2022 | Published: 10 Feb 2022

TOPICS:  .NET
Tanium

What generative AI's rise means for the cybersecurity industry
sponsored by TechTarget ComputerWeekly.com
EGUIDE: ChatGPT's cultural and economic ascent in recent months has led to an interest in generative AI as a whole, and that moment has included cybersecurity. However, experts differ on whether the moment is more steeped in marketing or emerging technology.
Posted: 19 Jun 2023 | Published: 19 Jun 2023

TechTarget ComputerWeekly.com

Visibility into Virtual Environments
sponsored by Gigamon
WEBCAST: Check out this brief webcast to discover how a network traffic visibility tool works, and if it would be a good fit for your organization's IT environment.
Posted: 09 Apr 2014 | Premiered: Apr 9, 2014

Gigamon

Buyer's Essentials: What to Look for in Single Sign-On Technology
sponsored by TechTarget Health IT
EBOOK: Are you on the hunt for single sign-on (SSO) technology? Discover the differences between the numerous approaches to SSO, their benefits, and what works for various types of healthcare organizations. In this guide, health IT expert Rick Krohn shares his advice on choosing the right SSO tech for your practice.
Posted: 24 Mar 2016 | Published: 18 Mar 2016

TechTarget Health IT

August Issue of Information Security magazine: On the Lookout: Countering modern threats requires hunting intruders
sponsored by Information Security Magazine
EZINE: This month's Information Security Magazine Online cover story highlights the concern surrounding self-defending networks and explores a new approach to network security – CTOps. Also, learn how to uncover hidden opportunities that could be lurking in your overflow of data and gain an indepth look of the biggest IT giants in today's security market.
Posted: 08 Aug 2011 | Published: 08 Aug 2011

Information Security Magazine

The technological evolution of IT industry leaders: Part two
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Companies leading the technological evolution have gone through changes. This second part of this e-guide explores the technological evolution of SAP, Microsoft and some business analytics vendors throughout the past two decades.
Posted: 08 Feb 2021 | Published: 26 Feb 2020

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to blockchain technology
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.
Posted: 08 Feb 2021 | Published: 16 Oct 2019

TechTarget ComputerWeekly.com

Security Think Tank: Critical National Infrastructure
sponsored by TechTarget ComputerWeekly.com
EGUIDE: We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.
Posted: 27 Apr 2021 | Published: 27 Apr 2021

TechTarget ComputerWeekly.com

How Tanium Threat Response Augments Endpoint Detection And Response (EDR) And SIEM Solutions
sponsored by Tanium
WHITE PAPER: While SIEM and EDR solutions provide a wealth of information, there is a threshold that many investigators run into – a point where visibility ends. Access this white paper to learn about a platform designed to supplement the threat intelligence and detections coming from your SIEM an EDR solutions.
Posted: 15 Sep 2023 | Published: 15 Sep 2023

TOPICS:  .NET
Tanium

Information Security Magazine Online July/August Issue – Demystifying APT: Get the facts about this targeted threat activity
sponsored by Information Security Magazine
WHITE PAPER: The industry has preached the need for software security and secure coding for several years now. After all, if software is designed securely from the start, it means fewer problems down the road. Read this paper now to learn more.
Posted: 21 Jul 2010 | Published: 21 Jul 2010

Information Security Magazine

Judging MSSP Options With Care
sponsored by TechTarget Security
EBOOK: The managed security services market is both essential and complex. This guide explains how to approach the hunt for a managed security services provider.
Posted: 21 Dec 2016 | Published: 21 Dec 2016

TechTarget Security

Top 5 Reasons to Choose EMC Isilon for Video Surveillance
sponsored by EMC & Arrow
DATA SHEET: Access this concise resource to uncover five top reasons why you should adopt an impressive video surveillance system, so you can gain peace of mind knowing your business is safe and secure.
Posted: 04 Apr 2014 | Published: 31 Dec 2012

EMC & Arrow

A Computer Weekly buyer’s guide to blockchain technology
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

TechTarget ComputerWeekly.com

Security Think Tank: Critical National Infrastructure
sponsored by TechTarget ComputerWeekly.com
EGUIDE: We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.
Posted: 27 Aug 2021 | Published: 27 Aug 2021

TechTarget ComputerWeekly.com

Computer Weekly – 19 April 2016: The hunters who prey on cyber criminals
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the hunters – a new breed of security expert that proactively hunts down cyber attackers. We visit Silicon Valley to meet some of the up-and-coming startups in data analytics. And we hear from IT leaders about the people, process and cultural aspects of managing digital transformation. Read the issue now.
Posted: 18 Apr 2016 | Published: 19 Apr 2016

TechTarget ComputerWeekly.com

The Relationship Between IoT & AI
sponsored by Estafet Ltd
EGUIDE: The future of the digital world relies on how people and "things" will interact with each other. Download this expert guide to unveil the intimate relationship between IoT and AI for in-process hybrid transactional/analytical processing (HTAP).
Posted: 27 Aug 2018 | Published: 22 Aug 2018

Estafet Ltd

Security and risk management in the wake of the Log4j vulnerability
sponsored by Tanium
EBOOK: Read this e-book to get a quick refresher on the Log4j vulnerability and its threat, the longer-term issues of software management, compliance risks, and threat hunting — and how security and risk teams should rethink their roles and processes as a result.
Posted: 25 Mar 2022 | Published: 25 Mar 2022

TOPICS:  .NET
Tanium

The Trustwave Difference: Your Trusted Partner in Cyber Security
sponsored by Trustwave
PRODUCT OVERVIEW: The duties of CISOs are seemingly endless. According to a report by Nominet Cyber Security, 48% of CISOs shared that the stress caused by the job has impacted their mental health. In an effort to alleviate some of that stress, Trustwave developed teams to serve as resources for CISOs. Explore this overview to learn more.
Posted: 15 Feb 2023 | Published: 15 Feb 2023

TOPICS:  .NET
Trustwave

MANAGED MDR VS. MANAGED EDR WHICH ONE IS RIGHT FOR YOU?
sponsored by Gradient Cyber
EBOOK: Which is right for your business, managed endpoint detection and response (MEDR) or managed extended detection and response (MXDR)? To understand how the services stack up against each other in terms of focus, threat hunting, automation and more, download this 15-page e-book.
Posted: 31 Jan 2024 | Published: 31 Jan 2024

TOPICS:  .NET
Gradient Cyber