Case Study: Top University Builds Custom Detection Scripts
sponsored by CoreLight
CASE STUDY:
Learn how this top research university was able to meet all of their network traffic analysis requirements with fast network log searches, expanded custom detection scripting capabilities, and more.
Posted: 28 Jan 2019 | Published: 28 Jan 2019
TOPICS:
|
|
|
Case Study: Security Team Sees 95% Reduction in Incident Response Time
sponsored by CoreLight
CASE STUDY:
In this case study, find out how Corelight provided Education First with real-time, detailed insight into network traffic spanning multiple business sites, as well as a reduced average incident response time from around 3 hours to less than 10 minutes (95% reduction.)
Posted: 28 Jan 2019 | Published: 28 Jan 2019
TOPICS:
|
|
|
4 Steps to Transforming Network Security
sponsored by Tech Data - Vmware
WHITE PAPER:
Download this white paper to explore 4 steps you can take to revamp your network security, and learn about a technology that promises to transform networking and security with a software platform that can exist across data centers, clouds, and more, helping you maximize visibility.
Posted: 28 Jan 2019 | Published: 28 Jan 2019
TOPICS:
|
|
|
Corelight Webcast: New SIEM on the Block -- Meet Humio
sponsored by CoreLight
WEBCAST:
Bro network security monitoring is an open source tool. It turns raw network traffic into comprehensive network logs organized by protocol, with key fields extracted specifically for security use cases. In this webcast, watch a demo to see how Corelight's technical integration with Humio allows you to economically monitor all your network traffic.
Posted: 28 Jan 2019 | Premiered: Aug 21, 2018
TOPICS:
|
|
|
Employee Habits that Can Put Your Company at Risk
sponsored by Panda Security
WHITE PAPER:
While maintaining secure devices and networks is critical to an organization's cybersecurity, it's not the only thing companies should focus on. When it comes to keeping an organization secure, employees are often the weakest link. Download this white paper to learn how employees are threatening your company and ways to prevent it.
Posted: 28 Jan 2019 | Published: 28 Jan 2019
TOPICS:
|
|
|
Cryptojacking: A Hidden Cost
sponsored by Panda Security
WHITE PAPER:
Cryptojacking is one of the newest threats to cybersecurity in the last two years. Easy to carry out and difficult to detect, these attacks involve cybercriminals taking control of a third-party device's CPU to mine valuable cryptocurrencies. Download this white paper to learn more about the threat and how to protect your devices.
Posted: 28 Jan 2019 | Published: 28 Jan 2019
TOPICS:
|
|
|
Resolving the Agile vs. Secure Application Networking Tradeoff
sponsored by NetFoundry
WHITE PAPER:
Read this white paper to learn about a new networking platform designed to enable secure and reliable connect applications without the constraints of VPNs, custom hardware and private circuits.
Posted: 25 Jan 2019 | Published: 25 Jan 2019
TOPICS:
|
|
|
Asset Management for Cybersecurity: 10 Essential Questions to Answer
sponsored by Axonius
WHITE PAPER:
When Axonius built their cybersecurity asset management platform, they had conversations with hundreds of security professionals about the challenges they face around seeing and securing all assets. In this post, they cover the 10 most common questions they heard, why they are difficult to answer, and how to overcome the obstacles.
Posted: 23 Jan 2019 | Published: 23 Jan 2019
TOPICS:
|
|
|
Building a Business Case for Cybersecurity Asset Management
sponsored by Axonius
WHITE PAPER:
With many competing priorities facing information security teams, any new project must be prioritized against risk, net new capabilities, and ROI. Another challenge is the increasing number and types of devices on corporate networks. In this white paper, learn how to manage these challenges by using a cybersecurity asset management tool.
Posted: 23 Jan 2019 | Published: 31 Aug 2018
TOPICS:
|
|
|
2019 Network Security Predictions: Top Trends & Challenges
sponsored by TBNG Consulting
EGUIDE:
Read this expert guide to review predicted networking trends for 2019. Also, learn why network security remains a top challenge and how you can properly manage it.
Posted: 23 Jan 2019 | Published: 18 Jan 2019
TOPICS:
|
|
|
Magic Quadrant for Security Information and Event Management
sponsored by LogRhythm, Inc.
RESEARCH CONTENT:
Security and risk management leaders increasingly seek SIEM solutions with capabilities that support early targeted attack detection and response. Users must balance advanced SIEM capabilities with the resources needed to run and tune the solution. This Gartner research report provides information about SIEM solutions and an analysis of vendors.
Posted: 23 Jan 2019 | Published: 03 Dec 2018
TOPICS:
|
|
|
5 Things You Can Do by Adding a Layer of Cloud-Delivered Protection
sponsored by Cisco Meraki
RESOURCE:
In this white paper, find out how you can deliver a 100% cloud-delivered secure internet gateway that provides a line of defense against threats on the Internet, and explore 5 things you can do by adding a layer of cloud-delivered protection.
Posted: 22 Jan 2019 | Published: 22 Jan 2019
TOPICS:
|
|
|
8 Reasons Why SIEM Users Are Making the Switch to LogRhythm
sponsored by LogRhythm, Inc.
PRODUCT REVIEW:
In this resource, discover 8 reasons why LogRhythm customers made the switch from SIEMs. The top reasons include stopping the bad guys, saving time and resource drain, having a better user interface and more.
Posted: 22 Jan 2019 | Published: 22 Jan 2019
TOPICS:
|
|
|
The 2019 Security Strategy
sponsored by Cloudflare
VIDEO:
How are you planning to secure your employees, your company, and your customers in 2019? Watch this webinar to hear from Cloudfare CSO Joe Sullivan on the core strategies he uses to help protect Cloudfare, and—as a result—its 12M domains that rely on it for security and performance.
Posted: 22 Jan 2019 | Premiered: 17 Jan 2019
TOPICS:
|
|
|
Threat Intelligence Report
sponsored by DomainTools
RESEARCH CONTENT:
Threat intelligence has become a significant weapon in the fight against cybersecurity threats, and a large majority of organizations have made it a key part of their security programs. Organizations are leveraging threat intelligence data for a number of use cases. In this white paper, learn more about benefits of threat intelligence platforms.
Posted: 22 Jan 2019 | Published: 22 Jan 2019
TOPICS:
|
|
|
Key Questions to Ask when Evaluating UCaaS Providers
sponsored by Mitel Networks Limited
WHITE PAPER:
In this guide, discover 12 categories – each with a set of targeted questions – that are designed to help you evaluate UCaaS providers and ensure you make an informed decision that will benefit your communications.
Posted: 21 Jan 2019 | Published: 31 Dec 2018
TOPICS:
|
|
|
Device Discovery for Vulnerability Assessment: Automating the Handoff
sponsored by Axonius
WHITE PAPER:
While vulnerability assessment tools are widely believed to be very mature and approaching commodity status, they are only able to scan and analyze those assets they know about. In this white paper, we'll highlight how automating both device discovery and making VA tools aware of new devices that should be scanned can help your security efforts.
Posted: 21 Jan 2019 | Published: 21 Jan 2019
TOPICS:
|
|
|
The 1st Step to Zero Trust: Asset Management for Cybersecurity
sponsored by Axonius
WHITE PAPER:
8 years after the Zero Trust model was introduced, the concept has hit the mainstream. A Forrester analyst says 85% of his calls involve zero trust. With the amount of interest in the concept, many organizations are rushing to understand how to implement it. In this white paper, learn the first step to implementing zero trust: asset management.
Posted: 21 Jan 2019 | Published: 21 Jan 2019
TOPICS:
|
|
|
5 Questions to Ask in Global Network Services RFPs
sponsored by MASERGY
RESOURCE:
Download this resource for tips on creating RFPs for global network services, and find out 5 must-have questions to include in your RFP.
Posted: 18 Jan 2019 | Published: 18 Jan 2019
TOPICS:
|
|
|
Spotlight On The Total Economic Impact Of A Virtual Cloud Network
sponsored by VMware Velocloud
RESEARCH CONTENT:
To understand the benefits, costs, and risks associated with investing in a Virtual Cloud Network, delivered on NSX technology, as a way to bridge your network to the cloud, Forrester Research interviewed 5 VMware NSX customers. Explore Forrester's findings to learn about real life customers' experiences as they modernized their WAN for the cloud.
Posted: 18 Jan 2019 | Published: 31 May 2018
TOPICS:
|
|
|
Computer Weekly – 22 January 2019: Moving beyond network boundaries
sponsored by ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we look at how businesses are adapting to the challenges of perimeterless network security. We examine how digital transformation is bringing increased complications for identity and access management. And we ask if public cloud providers are a threat to the funding model for open source software. Read the issue now.
Posted: 18 Jan 2019 | Published: 18 Jan 2019
TOPICS:
|
|
|
How Neustar SiteProtect NG Safeguards its Customers
sponsored by Neustar
VIDEO:
In this video, hear from 6 Security and Network professionals on how their leading businesses were able to mitigate DDoS attacks using Neustar SiteProtect NG.
Posted: 18 Jan 2019 | Premiered: 16 Jan 2019
TOPICS:
|
|
|
Securing Applications in the Cloud
sponsored by Cloudflare
WHITE PAPER:
In this white paper, explore a network security tool designed to help you remain secure and 'always-on' by providing intelligent security at scale, and layered defenses to protect against DDoS, data theft and malicious bots.
Posted: 18 Jan 2019 | Published: 18 Jan 2019
TOPICS:
|
|
|
How Permanent TSB Protects its Online Banking System from DDoS Attacks
sponsored by Neustar
VIDEO:
Permanent TSB, the third largest Irish provider of personal retail banking services in Ireland, needed to protect their online banking services from harmful DDoS attacks. Read one to find out they accomplished DDoS security.
Posted: 18 Jan 2019 | Premiered: 18 Jan 2019
TOPICS:
|
|
|
Assessing the Cyberthreat Landscape: Today's Reality, Tomorrow's Risks
sponsored by Neustar
RESEARCH CONTENT:
The ever-changing cyberthreat landscape requires constant assessment. IT leaders must not only prioritize the many cyberthreats they face, but also use those insights to formulate and implement an appropriate mitigation strategy. Download this report sponsored by IDG to learn more about the cyberthreat landscape.
Posted: 17 Jan 2019 | Published: 17 Jan 2019
TOPICS:
|
|