Vertical Industries  >  

Hunting Industry

RSS Feed   
Hunting Industry Reports
 
Sun World International: A case study in smarter planet leadership
sponsored by IBM
CASE STUDY: This case study illustrates how Sun World International, a mid-sized grower in California, shifted its competitive strategy to capitalize on analytics and gain real-time insight into the competitive market. Learn how it gained a 5% reduction in harvesting costs, a 20% reduction in fuel usage and an eight-fold increase in profit per acre.
Posted: 22 May 2012 | Published: 22 May 2012

IBM

Computer Weekly – 26 January 2021: 'Salad as a service' – how tech could revolutionise farming
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how new technologies are supporting the rise of vertical farming, and could revolutionise food supply chains. We examine one of the biggest trends in the cloud – serverless computing. And Brexit has not yet ended the debate about UK-EU data protection. Read the issue now.
Posted: 25 Jan 2021 | Published: 26 Jan 2021

ComputerWeekly.com

Computer Weekly – 20 March 2018: Where neuroscience meets technology
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how computer scientists are using data, cloud and virtual reality to understand the brain and improve mental wellbeing. We analyse newly published government documents detailing the early problems with Universal Credit. And we look at how AI can help improve cyber security. Read the issue now.
Posted: 16 Mar 2018 | Published: 16 Mar 2018

ComputerWeekly.com

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

2020 Threat Hunting Survey Results
sponsored by DomainTools
RESEARCH CONTENT: Each year, SANS conducts a Threat Hunting Survey to better understand the threat hunting landscape and how security professionals are conducting threat hunting in their organizations – read on to unlock the results from this year’s survey.
Posted: 18 Dec 2020 | Published: 18 Dec 2020

DomainTools

2021 Threat Hunting Report
sponsored by DomainTools
RESEARCH CONTENT: In 2021, Cybersecurity Insiders conducted the fourth annual threat hunting research project to gain deeper insights into the maturity and evolution of the security practice. Download the report to uncover the results.
Posted: 22 Mar 2021 | Published: 22 Mar 2021

DomainTools

Threat Hunting Report
sponsored by DomainTools
RESEARCH CONTENT: Threat hunting is becoming the gold standard for addressing today’s increasingly disruptive cyberthreats – in fact, 93% of organizations agree that threat hunting should be a top security priority. Read this 2020 Threat Hunting Report for more insights and best practices as they related to the current state of threat hunting.
Posted: 17 Dec 2020 | Published: 17 Dec 2020

DomainTools

Observations from the Front Lines of Threat Hunting
sponsored by CrowdStrike
WHITE PAPER: This report provides a summary of OverWatch's findings from intrusion hunting during the first half of 2018. It reviews intrusion trends during that time frame, provides insights into the current landscape of adversary tactics and delivers highlights of notable intrusions OverWatch identified. Read on to learn more.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

CrowdStrike

Threat Hunting Assessment
sponsored by Dell SecureWorks
DATA SHEET: In an effort to better prepare for and defend against today’s sophisticated cyberthreats, organizations have begun embracing proactive security measures – such as threat hunting. Read this Threat Hunting Assessment to unlock expert insight into the benefits of threat hunting and guidance for getting started.
Posted: 24 Feb 2021 | Published: 24 Feb 2021

TOPICS:  Cybersecurity
Dell SecureWorks

Nowhere To Hide: 2020 Threat Hunting Report
sponsored by CrowdStrike
RESEARCH CONTENT: As threat hunting grows in popularity – and as cyberthreats grow stronger – security pros turn to the hunters for expertise on intrusion tactics and techniques. Examine CrowdStrike’s 2020 Threat Hunting Report to learn key trends and insights into the threat landscape that are shaping threat management programs for 2021.
Posted: 21 Apr 2021 | Published: 21 Apr 2021

TOPICS:  Cybersecurity
CrowdStrike

How to Become a Threat Hunter
sponsored by Cisco Systems Inc.
EGUIDE: Much of hunting is instinct, and when it comes to hunting cyberthreats, it’s no different. Threat hunters are good at what do because they aren’t as ‘by-the-book’ as other professionals. But they do have a set of learnable skills that make them successful. Download this e-guide featuring Gartner analyst John Collins to know what these skills are.
Posted: 14 Apr 2021 | Published: 07 Apr 2021

Cisco Systems Inc.

Allure of the threat hunter draws companies large and small
sponsored by SearchSecurity.com
EZINE: Do you need a threat hunter on your analyst team? Threat hunting allows companies to be proactive, rather than wait for attackers to trigger alarms after they have already infiltrated an organization's systems. Yet not every company is ready to employ threat hunting techniques.
Posted: 29 Nov 2018 | Published: 29 Nov 2018

SearchSecurity.com

Information Security Magazine – The Hunt for Data Analytics
sponsored by SearchSecurity.com
EZINE: Big data and analytics show promise for better threat detection. Should these technologies be combined with SIEM products, or is it time to move beyond these high alert systems?
Posted: 02 Mar 2015 | Published: 02 Mar 2015

SearchSecurity.com

IT INDUSTRY OUTLOOK
sponsored by CompTIA
WHITE PAPER: CompTIA's IT Industry Outlook 2021 is a research report that explores the trends shaping the industry, its workforce and its business models. Learn factors that could positively and negatively impact business growth in 2021, 2021 budget projections compared to 2020, and more.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

CompTIA

Explore the Threat Hunting Process
sponsored by SearchSecurity.com
EZINE: The threat hunting process hinges on an expert's ability to create hypotheses and to hunt for patterns and indicators of compromise in data-driven networks. In this issues of Information Security, explore learn how threat hunting programs can find security holes that machine learning or automated systems fail to detect.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

SearchSecurity.com

From collected to connected
sponsored by ServiceNow
WHITE PAPER: IoT technologies offer businesses a way to unlock powerful data hidden within their everyday operations, often collected but never used. Download this white paper to learn how ServiceNow can help you unify your service data and provide a single source of IoT truth for analytics, audits, and more.
Posted: 20 May 2021 | Published: 20 May 2021

ServiceNow

Visibility into Virtual Environments
sponsored by Gigamon
WEBCAST: Check out this brief webcast to discover how a network traffic visibility tool works, and if it would be a good fit for your organization's IT environment.
Posted: 09 Apr 2014 | Premiered: Apr 9, 2014

Gigamon

Kaspersky Threat Intelligence
sponsored by Kaspersky
WHITE PAPER: The need for effective threat intelligence programs has led organizations to employ teams of experts dedicated to threat intelligence, reporting, hunting and other similar functions. Read this white paper for a closer look at Kaspersky’s Threat Intelligence Services and discover if they can help you streamline your threat intel program.
Posted: 07 Jul 2021 | Published: 07 Jul 2021

TOPICS:  Cybersecurity
Kaspersky

The technological evolution of IT industry leaders: Part two
sponsored by ComputerWeekly.com
EGUIDE: Companies leading the technological evolution have gone through changes. This second part of this e-guide explores the technological evolution of SAP, Microsoft and some business analytics vendors throughout the past two decades.
Posted: 26 Feb 2020 | Published: 26 Feb 2020

ComputerWeekly.com

White Paper Hybrid Ai Offers The Cybersecurity Industry’s Most Effective Defense
sponsored by Arctic Wolf
WHITE PAPER: When it comes to modern cybersecurity, should you turn to human-powered security teams or AI-based tools and processes? This white paper explores each option and introduces hybrid AI – an approach to security that combines the best of both man and machine cyberdefense efforts. Read on to get started.
Posted: 01 Jul 2021 | Published: 01 Jul 2021

Arctic Wolf

Fixed Industrial Scanners And Machine Vision Smart Cameras
sponsored by Zebra Technologies
PRODUCT OVERVIEW: Open up this paper to explore Zebra’s complete portfolio of fixed industrial scanners and machine vision systems, covering key capabilities, features, accessories, and more.
Posted: 02 Jun 2021 | Published: 02 Jun 2021

TOPICS:  Manufacturing
Zebra Technologies

Buyer's Essentials: What to Look for in Single Sign-On Technology
sponsored by SearchHealthIT.com
EBOOK: Are you on the hunt for single sign-on (SSO) technology? Discover the differences between the numerous approaches to SSO, their benefits, and what works for various types of healthcare organizations. In this guide, health IT expert Rick Krohn shares his advice on choosing the right SSO tech for your practice.
Posted: 24 Mar 2016 | Published: 18 Mar 2016

SearchHealthIT.com

Certified Kubernetes Application Developer (CKAD) Study Guide
sponsored by Cockroach Industries
RESOURCE: Access this O'Reilly study guide for the CKAD exam for in-depth guidance and practice on the exam, its content, and strategies.
Posted: 15 Jun 2021 | Published: 15 Jun 2021

TOPICS:  .NET
Cockroach Industries

A Computer Weekly buyer’s guide to blockchain technology
sponsored by ComputerWeekly.com
EGUIDE: Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

ComputerWeekly.com

A Computer Weekly buyer's guide to blockchain technology
sponsored by ComputerWeekly.com
EGUIDE: Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.
Posted: 16 Oct 2019 | Published: 16 Oct 2019

ComputerWeekly.com

Mapping Industrial Cybersecurity Threats to MITRE ATT&CK White Paper
sponsored by Dragos
EGUIDE: Industrial control systems (ICS) are being targeted by sophisticated cyberthreats. The MITRE ATT&CK for ICS is a framework designed to aggregate known patterns about these threats in order to help organizations identify and mitigate them. Read this e-guide to learn more about MITRE ATT&CK for ICS.
Posted: 12 Apr 2021 | Published: 12 Apr 2021

TOPICS:  Cybersecurity
Dragos

The Total Economic Impact™ Of Secureworks ® Taegis™ Managed X Dr
sponsored by Dell SecureWorks
ANALYST REPORT: To better understand the benefits, costs, and risks associated with this investment, Forrester interviewed four customers with experience using Secureworks ManagedXDR. Download the report to see what they said.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

TOPICS:  Security
Dell SecureWorks

Information Security Magazine Online July/August Issue – Demystifying APT: Get the facts about this targeted threat activity
sponsored by Information Security Magazine
WHITE PAPER: The industry has preached the need for software security and secure coding for several years now. After all, if software is designed securely from the start, it means fewer problems down the road. Read this paper now to learn more.
Posted: 21 Jul 2010 | Published: 21 Jul 2010

Information Security Magazine

Accelerating Security Response
sponsored by ServiceNow
WHITE PAPER: While financial institutions have always been aware and working on reducing threats, new challenges continue to emerge, making it ever harder to keep managing risks and resources in this critical area. In this white paper, learn about some of these new challenges and how financial institutions are leveraging ServiceNow to address them.
Posted: 24 Oct 2019 | Published: 24 Oct 2019

ServiceNow
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences