Vertical Industries  >  

Hunting Industry

RSS Feed   
Hunting Industry Reports
 
Sun World International: A case study in smarter planet leadership
sponsored by IBM
CASE STUDY: This case study illustrates how Sun World International, a mid-sized grower in California, shifted its competitive strategy to capitalize on analytics and gain real-time insight into the competitive market. Learn how it gained a 5% reduction in harvesting costs, a 20% reduction in fuel usage and an eight-fold increase in profit per acre.
Posted: 22 May 2012 | Published: 22 May 2012

IBM

Computer Weekly – 20 March 2018: Where neuroscience meets technology
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how computer scientists are using data, cloud and virtual reality to understand the brain and improve mental wellbeing. We analyse newly published government documents detailing the early problems with Universal Credit. And we look at how AI can help improve cyber security. Read the issue now.
Posted: 16 Mar 2018 | Published: 16 Mar 2018

ComputerWeekly.com

Computer Weekly – 26 January 2021: 'Salad as a service' – how tech could revolutionise farming
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how new technologies are supporting the rise of vertical farming, and could revolutionise food supply chains. We examine one of the biggest trends in the cloud – serverless computing. And Brexit has not yet ended the debate about UK-EU data protection. Read the issue now.
Posted: 25 Jan 2021 | Published: 26 Jan 2021

ComputerWeekly.com

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

2020 Threat Hunting Survey Results
sponsored by DomainTools
RESEARCH CONTENT: Each year, SANS conducts a Threat Hunting Survey to better understand the threat hunting landscape and how security professionals are conducting threat hunting in their organizations – read on to unlock the results from this year’s survey.
Posted: 18 Dec 2020 | Published: 18 Dec 2020

DomainTools

2021 Threat Hunting Report
sponsored by DomainTools
RESEARCH CONTENT: In 2021, Cybersecurity Insiders conducted the fourth annual threat hunting research project to gain deeper insights into the maturity and evolution of the security practice. Download the report to uncover the results.
Posted: 22 Mar 2021 | Published: 22 Mar 2021

DomainTools

Threat Hunting Report
sponsored by DomainTools
RESEARCH CONTENT: Threat hunting is becoming the gold standard for addressing today’s increasingly disruptive cyberthreats – in fact, 93% of organizations agree that threat hunting should be a top security priority. Read this 2020 Threat Hunting Report for more insights and best practices as they related to the current state of threat hunting.
Posted: 17 Dec 2020 | Published: 17 Dec 2020

DomainTools

Observations from the Front Lines of Threat Hunting
sponsored by CrowdStrike
WHITE PAPER: This report provides a summary of OverWatch's findings from intrusion hunting during the first half of 2018. It reviews intrusion trends during that time frame, provides insights into the current landscape of adversary tactics and delivers highlights of notable intrusions OverWatch identified. Read on to learn more.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

CrowdStrike

Threat Hunting Assessment
sponsored by Dell SecureWorks
DATA SHEET: In an effort to better prepare for and defend against today’s sophisticated cyberthreats, organizations have begun embracing proactive security measures – such as threat hunting. Read this Threat Hunting Assessment to unlock expert insight into the benefits of threat hunting and guidance for getting started.
Posted: 24 Feb 2021 | Published: 24 Feb 2021

TOPICS:  Cybersecurity
Dell SecureWorks

How to Become a Threat Hunter
sponsored by Cisco Systems Inc.
EGUIDE: Much of hunting is instinct, and when it comes to hunting cyberthreats, it’s no different. Threat hunters are good at what do because they aren’t as ‘by-the-book’ as other professionals. But they do have a set of learnable skills that make them successful. Download this e-guide featuring Gartner analyst John Collins to know what these skills are.
Posted: 14 Apr 2021 | Published: 07 Apr 2021

Cisco Systems Inc.

Explore the Threat Hunting Process
sponsored by SearchSecurity.com
EZINE: The threat hunting process hinges on an expert's ability to create hypotheses and to hunt for patterns and indicators of compromise in data-driven networks. In this issues of Information Security, explore learn how threat hunting programs can find security holes that machine learning or automated systems fail to detect.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

SearchSecurity.com

Nowhere To Hide: 2020 Threat Hunting Report
sponsored by CrowdStrike
RESEARCH CONTENT: As threat hunting grows in popularity – and as cyberthreats grow stronger – security pros turn to the hunters for expertise on intrusion tactics and techniques. Examine CrowdStrike’s 2020 Threat Hunting Report to learn key trends and insights into the threat landscape that are shaping threat management programs for 2021.
Posted: 21 Apr 2021 | Published: 21 Apr 2021

TOPICS:  Cybersecurity
CrowdStrike

Information Security Magazine – The Hunt for Data Analytics
sponsored by SearchSecurity.com
EZINE: Big data and analytics show promise for better threat detection. Should these technologies be combined with SIEM products, or is it time to move beyond these high alert systems?
Posted: 02 Mar 2015 | Published: 02 Mar 2015

SearchSecurity.com

Allure of the threat hunter draws companies large and small
sponsored by SearchSecurity.com
EZINE: Do you need a threat hunter on your analyst team? Threat hunting allows companies to be proactive, rather than wait for attackers to trigger alarms after they have already infiltrated an organization's systems. Yet not every company is ready to employ threat hunting techniques.
Posted: 29 Nov 2018 | Published: 29 Nov 2018

SearchSecurity.com

Mapping Industrial Cybersecurity Threats
sponsored by Dragos
EGUIDE: Industrial control systems (ICS) are being targeted by sophisticated cyberthreats. The MITRE ATT&CK for ICS is a framework designed to aggregate known patterns about these threats in order to help organizations identify and mitigate them. Read this e-guide to learn more about MITRE ATT&CK for ICS.
Posted: 12 Apr 2021 | Published: 12 Apr 2021

TOPICS:  Cybersecurity
Dragos

The technological evolution of IT industry leaders: Part two
sponsored by ComputerWeekly.com
EGUIDE: Companies leading the technological evolution have gone through changes. This second part of this e-guide explores the technological evolution of SAP, Microsoft and some business analytics vendors throughout the past two decades.
Posted: 26 Feb 2020 | Published: 26 Feb 2020

ComputerWeekly.com

Visibility into Virtual Environments
sponsored by Gigamon
WEBCAST: Check out this brief webcast to discover how a network traffic visibility tool works, and if it would be a good fit for your organization's IT environment.
Posted: 09 Apr 2014 | Premiered: Apr 9, 2014

Gigamon

Information Security Magazine Online July/August Issue – Demystifying APT: Get the facts about this targeted threat activity
sponsored by Information Security Magazine
WHITE PAPER: The industry has preached the need for software security and secure coding for several years now. After all, if software is designed securely from the start, it means fewer problems down the road. Read this paper now to learn more.
Posted: 21 Jul 2010 | Published: 21 Jul 2010

Information Security Magazine

2021 Cyber Threat Intelligence Survey
sponsored by DomainTools
ANALYST REPORT: Are you or other members of your organization looking to gain a greater understanding of bad actors and their efforts? Investigate the 2021 SANS Cyber Threat Intelligence Survey, which examines the capabilities, opportunities and intent of adversaries conducting cyber operations.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

DomainTools

Buyer's Essentials: What to Look for in Single Sign-On Technology
sponsored by SearchHealthIT.com
EBOOK: Are you on the hunt for single sign-on (SSO) technology? Discover the differences between the numerous approaches to SSO, their benefits, and what works for various types of healthcare organizations. In this guide, health IT expert Rick Krohn shares his advice on choosing the right SSO tech for your practice.
Posted: 24 Mar 2016 | Published: 18 Mar 2016

SearchHealthIT.com

A Computer Weekly buyer's guide to blockchain technology
sponsored by ComputerWeekly.com
EGUIDE: Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.
Posted: 16 Oct 2019 | Published: 16 Oct 2019

ComputerWeekly.com

Accelerating Security Response
sponsored by ServiceNow
WHITE PAPER: While financial institutions have always been aware and working on reducing threats, new challenges continue to emerge, making it ever harder to keep managing risks and resources in this critical area. In this white paper, learn about some of these new challenges and how financial institutions are leveraging ServiceNow to address them.
Posted: 24 Oct 2019 | Published: 24 Oct 2019

ServiceNow

A Computer Weekly buyer’s guide to blockchain technology
sponsored by ComputerWeekly.com
EGUIDE: Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

ComputerWeekly.com

August Issue of Information Security magazine: On the Lookout: Countering modern threats requires hunting intruders
sponsored by Information Security Magazine
EZINE: This month's Information Security Magazine Online cover story highlights the concern surrounding self-defending networks and explores a new approach to network security – CTOps. Also, learn how to uncover hidden opportunities that could be lurking in your overflow of data and gain an indepth look of the biggest IT giants in today's security market.
Posted: 08 Aug 2011 | Published: 08 Aug 2011

Information Security Magazine

Securing The World’s Largest Airport With Cisco Advanced Malware Protection (AMP)
sponsored by Cisco Systems, Inc.
CASE STUDY: When we think of airport security, we often think of physical checkpoints – however, just like any other business, airports are subject to advanced cyberthreats. Read this case study to see how the Cisco helped the world’s largest airport protect itself against malware attacks.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

Cisco Systems, Inc.

Judging MSSP Options With Care
sponsored by SearchSecurity.com
EBOOK: The managed security services market is both essential and complex. This guide explains how to approach the hunt for a managed security services provider.
Posted: 21 Dec 2016 | Published: 21 Dec 2016

SearchSecurity.com

Top 5 Reasons to Choose EMC Isilon for Video Surveillance
sponsored by EMC & Arrow
DATA SHEET: Access this concise resource to uncover five top reasons why you should adopt an impressive video surveillance system, so you can gain peace of mind knowing your business is safe and secure.
Posted: 04 Apr 2014 | Published: 31 Dec 2012

EMC & Arrow

The eSentire Difference
sponsored by eSentire
DATA SHEET: In this data sheet, learn how eSentire Atlas defends your digital business from evolving threats. Their cloud-native Managed Detection and Response (MDR) platform combines expert machine learning with expert analysts in their 24x7x365 Security Operations Centers (SOCs) to hunt and contain attacks.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

eSentire

Considerations for CuttingEdge Threat Intelligence & Incident Response
sponsored by Farsight Security
EGUIDE: The use of a cyberthreat intelligence team can greatly help organizations. Learn the best practices for team location and selection from expert Robert M. Lee.
Posted: 10 Sep 2019 | Published: 10 Sep 2019

Farsight Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences