Vertical Industries  >  

Hunting Industry

RSS Feed   
Hunting Industry Reports
 
Sun World International: A case study in smarter planet leadership
sponsored by IBM
CASE STUDY: This case study illustrates how Sun World International, a mid-sized grower in California, shifted its competitive strategy to capitalize on analytics and gain real-time insight into the competitive market. Learn how it gained a 5% reduction in harvesting costs, a 20% reduction in fuel usage and an eight-fold increase in profit per acre.
Posted: 22 May 2012 | Published: 22 May 2012

IBM

Computer Weekly – 20 March 2018: Where neuroscience meets technology
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how computer scientists are using data, cloud and virtual reality to understand the brain and improve mental wellbeing. We analyse newly published government documents detailing the early problems with Universal Credit. And we look at how AI can help improve cyber security. Read the issue now.
Posted: 16 Mar 2018 | Published: 16 Mar 2018

ComputerWeekly.com

Computer Weekly – 26 January 2021: 'Salad as a service' – how tech could revolutionise farming
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how new technologies are supporting the rise of vertical farming, and could revolutionise food supply chains. We examine one of the biggest trends in the cloud – serverless computing. And Brexit has not yet ended the debate about UK-EU data protection. Read the issue now.
Posted: 25 Jan 2021 | Published: 26 Jan 2021

ComputerWeekly.com

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

2021 Threat Hunting Report
sponsored by DomainTools
RESEARCH CONTENT: In 2021, Cybersecurity Insiders conducted the fourth annual threat hunting research project to gain deeper insights into the maturity and evolution of the security practice. Download the report to uncover the results.
Posted: 22 Mar 2021 | Published: 22 Mar 2021

DomainTools

Threat Hunting Report
sponsored by DomainTools
RESEARCH CONTENT: Threat hunting is becoming the gold standard for addressing today’s increasingly disruptive cyberthreats – in fact, 93% of organizations agree that threat hunting should be a top security priority. Read this 2020 Threat Hunting Report for more insights and best practices as they related to the current state of threat hunting.
Posted: 17 Dec 2020 | Published: 17 Dec 2020

DomainTools

Observations from the Front Lines of Threat Hunting
sponsored by CrowdStrike
WHITE PAPER: This report provides a summary of OverWatch's findings from intrusion hunting during the first half of 2018. It reviews intrusion trends during that time frame, provides insights into the current landscape of adversary tactics and delivers highlights of notable intrusions OverWatch identified. Read on to learn more.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

CrowdStrike

Threat Hunting Assessment
sponsored by Dell SecureWorks
DATA SHEET: In an effort to better prepare for and defend against today’s sophisticated cyberthreats, organizations have begun embracing proactive security measures – such as threat hunting. Read this Threat Hunting Assessment to unlock expert insight into the benefits of threat hunting and guidance for getting started.
Posted: 24 Feb 2021 | Published: 24 Feb 2021

TOPICS:  Cybersecurity
Dell SecureWorks

A SANS 2021 Survey: Threat Hunting in Uncertain Times
sponsored by DomainTools
WHITE PAPER: SANS conducted a 2021 Threat Hunting Survey to examine how cybersecurity professionals hunt inside their organizations to more rapidly detect and identify threats. This white paper includes 11 survey questions from respondents with varying industries, sizes, roles, and locations. Read on to see the results and insights.
Posted: 24 Sep 2021 | Published: 24 Sep 2021

TOPICS:  .NET
DomainTools

2021 Threat Hunting Report
sponsored by CrowdStrike
ANALYST REPORT: To provide a comprehensive look at today’s threat environment, Overwatch produced a summary of threat hunting insights from July 2020 through June 2021 such as intrusion trends, current adversary tactics, case studies and more. Download this report to tap into these insights and learn about defensive recommendations.
Posted: 18 Oct 2021 | Published: 18 Oct 2021

TOPICS:  .NET
CrowdStrike

How to Become a Threat Hunter
sponsored by Cisco Systems Inc.
EGUIDE: Much of hunting is instinct, and when it comes to hunting cyberthreats, it’s no different. Threat hunters are good at what do because they aren’t as ‘by-the-book’ as other professionals. But they do have a set of learnable skills that make them successful. Download this e-guide featuring Gartner analyst John Collins to know what these skills are.
Posted: 14 Apr 2021 | Published: 07 Apr 2021

Cisco Systems Inc.

Nowhere To Hide: 2020 Threat Hunting Report
sponsored by CrowdStrike
RESEARCH CONTENT: As threat hunting grows in popularity – and as cyberthreats grow stronger – security pros turn to the hunters for expertise on intrusion tactics and techniques. Examine CrowdStrike’s 2020 Threat Hunting Report to learn key trends and insights into the threat landscape that are shaping threat management programs for 2021.
Posted: 21 Apr 2021 | Published: 21 Apr 2021

TOPICS:  Cybersecurity
CrowdStrike

Allure of the threat hunter draws companies large and small
sponsored by SearchSecurity.com
EZINE: Do you need a threat hunter on your analyst team? Threat hunting allows companies to be proactive, rather than wait for attackers to trigger alarms after they have already infiltrated an organization's systems. Yet not every company is ready to employ threat hunting techniques.
Posted: 29 Nov 2018 | Published: 29 Nov 2018

SearchSecurity.com

Industrial Cybersecurity for Executives
sponsored by Dragos
EGUIDE: 90% of organizations had extremely limited to no visibility into their OT environments, including ICS networks, assets, and flow of information between them, according to Dragos Year in Review. OT security and IT security are different by nature. Download Dragos’ executive guide to industrial cybersecurity to learn about 7 key concepts.
Posted: 17 Sep 2021 | Published: 17 Sep 2021

TOPICS:  .NET
Dragos

Information Security Magazine – The Hunt for Data Analytics
sponsored by SearchSecurity.com
EZINE: Big data and analytics show promise for better threat detection. Should these technologies be combined with SIEM products, or is it time to move beyond these high alert systems?
Posted: 02 Mar 2015 | Published: 02 Mar 2015

SearchSecurity.com

IT INDUSTRY OUTLOOK
sponsored by CompTIA
WHITE PAPER: CompTIA's IT Industry Outlook 2021 is a research report that explores the trends shaping the industry, its workforce and its business models. Learn factors that could positively and negatively impact business growth in 2021, 2021 budget projections compared to 2020, and more.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

CompTIA

Explore the Threat Hunting Process
sponsored by SearchSecurity.com
EZINE: The threat hunting process hinges on an expert's ability to create hypotheses and to hunt for patterns and indicators of compromise in data-driven networks. In this issues of Information Security, explore learn how threat hunting programs can find security holes that machine learning or automated systems fail to detect.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

SearchSecurity.com

Bitdefender Managed Detection & Response Service
sponsored by Bitdefender
DATA SHEET: Security continues to increase in risk and importance for businesses globally. So, how can Bitdefender MDR service help? Bitdefender MDR service is delivered by combining industry-leading cybersecurity for endpoints, plus network and security analytics, with threat-hunting expertise. Read on to learn more about Bitdefender MDR.
Posted: 24 Sep 2021 | Published: 24 Sep 2021

TOPICS:  .NET
Bitdefender

From collected to connected
sponsored by ServiceNow
WHITE PAPER: IoT technologies offer businesses a way to unlock powerful data hidden within their everyday operations, often collected but never used. Download this white paper to learn how ServiceNow can help you unify your service data and provide a single source of IoT truth for analytics, audits, and more.
Posted: 20 May 2021 | Published: 20 May 2021

ServiceNow

Visibility into Virtual Environments
sponsored by Gigamon
WEBCAST: Check out this brief webcast to discover how a network traffic visibility tool works, and if it would be a good fit for your organization's IT environment.
Posted: 09 Apr 2014 | Premiered: Apr 9, 2014

Gigamon

Detecting and Responding to Zero-Day Attacks
sponsored by eSentire
VIRTUAL SEMINAR: 2021 already experienced 18 zero-day exploits roughly halfway through the year. eSentire and VMware Carbon Black’s leading threat researchers dissect the observations made on the front lines of hunting and discovering these vulnerabilities. Watch the webinar to learn about zero-day best, detecting malicious behaviors, and more.
Posted: 12 Aug 2021 | Premiered: 12 Aug 2021

TOPICS:  .NET
eSentire

Kaspersky Threat Intelligence
sponsored by Kaspersky
WHITE PAPER: The need for effective threat intelligence programs has led organizations to employ teams of experts dedicated to threat intelligence, reporting, hunting and other similar functions. Read this white paper for a closer look at Kaspersky’s Threat Intelligence Services and discover if they can help you streamline your threat intel program.
Posted: 07 Jul 2021 | Published: 07 Jul 2021

TOPICS:  Cybersecurity
Kaspersky

How Clorox Leverages Cloud SIEM Across Security Operations, Threat Hunting And IT Ops
sponsored by AWS-SumoLogic
CASE STUDY: If you’re an organization that handles enormous amounts of data between your servers, locations, and devices, it’s become essential to leverage cloud SIEM across security operations, threat hunting and IT operations. Download this case study to learn about how Clorox selected a modern SIEM and how it delivered value in 6 areas.
Posted: 01 Nov 2021 | Published: 01 Nov 2021

TOPICS:  .NET
AWS-SumoLogic

Buyer's Essentials: What to Look for in Single Sign-On Technology
sponsored by SearchHealthIT.com
EBOOK: Are you on the hunt for single sign-on (SSO) technology? Discover the differences between the numerous approaches to SSO, their benefits, and what works for various types of healthcare organizations. In this guide, health IT expert Rick Krohn shares his advice on choosing the right SSO tech for your practice.
Posted: 24 Mar 2016 | Published: 18 Mar 2016

SearchHealthIT.com

The technological evolution of IT industry leaders: Part two
sponsored by ComputerWeekly.com
EGUIDE: Companies leading the technological evolution have gone through changes. This second part of this e-guide explores the technological evolution of SAP, Microsoft and some business analytics vendors throughout the past two decades.
Posted: 26 Feb 2020 | Published: 26 Feb 2020

ComputerWeekly.com

White Paper Hybrid Ai Offers The Cybersecurity Industry’s Most Effective Defense
sponsored by Arctic Wolf
WHITE PAPER: When it comes to modern cybersecurity, should you turn to human-powered security teams or AI-based tools and processes? This white paper explores each option and introduces hybrid AI – an approach to security that combines the best of both man and machine cyberdefense efforts. Read on to get started.
Posted: 01 Jul 2021 | Published: 01 Jul 2021

Arctic Wolf

Information Security Magazine Online July/August Issue – Demystifying APT: Get the facts about this targeted threat activity
sponsored by Information Security Magazine
WHITE PAPER: The industry has preached the need for software security and secure coding for several years now. After all, if software is designed securely from the start, it means fewer problems down the road. Read this paper now to learn more.
Posted: 21 Jul 2010 | Published: 21 Jul 2010

Information Security Magazine

A Computer Weekly buyer’s guide to blockchain technology
sponsored by ComputerWeekly.com
EGUIDE: Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

ComputerWeekly.com

A Computer Weekly buyer's guide to blockchain technology
sponsored by ComputerWeekly.com
EGUIDE: Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.
Posted: 16 Oct 2019 | Published: 16 Oct 2019

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences