RSS feed Get our RSS feed

News by Topic

threat intelligence

Results 201 - 225 of 236Sort Results By: Published Date | Title | Company Name
By: Recorded Future     Published Date: Feb 13, 2019
This white paper outlines current approaches to implementing SIEM and enriching security products with threat intelligence.
Tags : 
     Recorded Future
By: Recorded Future     Published Date: Feb 13, 2019
There are plenty of misconceptions about what threat intelligence is. The most common (but slightly misguided) assumptions risk leading many security pros to believe that threat intelligence doesn’t have an advantage to bring into their particular role. In this white paper, explore how threat intelligence can be operationalized in a variety of roles, demonstrating the central part it can play in a proactive security strategy. You’ll also uncover: • Key threat intelligence attributes to power vulnerability management • 4 major challenges for incident response teams • 3 threat intelligent commandments • 4 pain points identified by security leaders And more
Tags : 
     Recorded Future
By: Recorded Future     Published Date: Apr 18, 2019
Supercharge Your Security Alert fatigue is the desensitization that comes from being bombarded with too many alerts — a sense of hopelessness from being overwhelmed by tasks and not knowing where to begin. If an overabundance of security alerts is tiring you out, check out our new e-book, “5 Ways to Supercharge Your Security With Threat Intelligence.” It shows exactly how to use threat intelligence to get the context you need to do something with all that data.
Tags : 
     Recorded Future
By: Recorded Future     Published Date: Apr 18, 2019
Enterprises increasingly operate in a digitally interconnected world where third parties like suppliers, customers, channel partners, and others are often directly connected to their internal IT systems, and where their underlying IT infrastructure may be owned and managed by an outside organization. These business relationships can knowingly or unknowingly introduce different types of risks that need to be identified and managed as if these third parties were part of the enterprise itself. Recorded Future's latest risk intelligence offering enables threat intelligence teams to better understand, monitor, and measure their real-time exposure to these third-party risks. Armed with this information, organizations can better assess and prioritize risk mitigation actions.
Tags : 
     Recorded Future
By: Recorded Future     Published Date: Apr 18, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more
Tags : 
     Recorded Future
By: Recorded Future     Published Date: Apr 18, 2019
When it comes to processing information, one full security event read by a machine is equal to just 10 words read by a human analyst, on average. Even the slightest delay can mean the difference between attack and action. Find out how you can connect the dots to rapidly reveal unknown threats before they impact your business, and respond to security alerts 10 times faster.
Tags : 
     Recorded Future
By: Recorded Future     Published Date: Apr 18, 2019
This white paper outlines current approaches to implementing SIEM and enriching security products with threat intelligence.
Tags : 
     Recorded Future
By: RSA Security     Published Date: Oct 24, 2013
This paper details why organization needs to shift more security resources from preventing intrusion toward rapid threat detection and remediation, and the intelligence-driven security approach that is required to do so.
Tags : rsa, emc, security, operations center, threat, threat detection, intelligence-driven
     RSA Security
By: RSA Security     Published Date: Oct 24, 2013
Mid-size enterprises face the challenges of managing advanced threats plus staff and budget constraints. This on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small.
Tags : rsa, emc, threat, analytics, intelligence, threat detection, security
     RSA Security
By: SAS     Published Date: Oct 03, 2018
Because terrorists and other criminals are already using technology to carry out their missions, intelligence professionals need to access all available, appropriate information, to extract important elements and process, analyze and disseminate it quickly to keep ahead of potential threats. The scale, complexity and changing nature of intelligence data can make it impossible to stay in front without the aid of technology to collect, process and analyze big data. This paper describes a solution for how this information can be quickly and safely shared with access based on a user's organizational responsibilities and need to know.
Tags : 
     SAS
By: Secureworks     Published Date: Oct 04, 2017
The SecureWorks® Counter Threat Unit™ (CTU) research team analyzes security threats and helps organizations protect their systems. During May and June 2017, CTU™ researchers identified lessons learned and observed notable developments in threat behaviors, the global threat landscape, and security trends: • The global WCry and NotPetya campaigns reinforced the need for a layered approach to security. • Attacks used obfuscated malicious files and scripts to bypass filtering and deliver malware. • A Chinese threat group has had repeated success using compromised websites to attack targeted organizations. • Threat actors have been stealing intellectual property from Japanese enterprises.
Tags : 
     Secureworks
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
SecureWorks provides an early warning system for evolving cyber threats, enabling organisations to prevent, detect, rapidly respond to and predict cyber attacks. Combining unparalleled visibility into the global threat landscape and powered by the Counter Threat Platform — our advanced data analytics and insights engine —SecureWorks minimises risk and delivers actionable, intelligence driven security solutions for clients around the world.
Tags : cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
     Secureworks ABM UK 2017
By: SilverSky     Published Date: Apr 16, 2013
In Forrester's 15-criteria evaluation of the emerging managed security services provider (MSSP) market, SilverSky was identified as a leader. Forrester identified the 10 most significant providers in this category and researched, analyzed, and scored them. SilverSky was given high ranks for business and technical value, SLA adherence, security services, and threat intelligence and analytics. Download this industry research paper now to learn why SilverSky is the MSSP you should be working with today.
Tags : managed security, msp, managed service provider, sla adherance, threat intelligence, analytics, mssp, forrester
     SilverSky
By: Splunk     Published Date: Apr 16, 2012
Read how Splunk enabled WhitePages, the largest on-line directory of people and businesses, to protect the site's content and the brand by monitoring abusive site traffic and learn how Splunk's in-house search eliminated a data warehouse investment.
Tags : splunk, whitepages, traffic, warehouse, data warehouse, directory, investment, threats data
     Splunk
By: Splunk     Published Date: Sep 17, 2012
Read this white paper to understand the evolving security landscape and how advanced persistent threats and sophisticated malware have fundamentally changed the way security teams must think about threats and the tools used for detective controls.
Tags : security threats, it security infrastructure, data protection, data loss prevention, data management, security intelligence, security
     Splunk
By: Splunk     Published Date: Aug 21, 2018
SIEM (security information and event management) software offers a lot of promise, but legacy SIEMs simply can't keep up with the rate and sophistication of today's cyberattacks. Organizations today require access to analytics-driven SIEMs that combine a big data platform that is optimized for machine data with advanced analytics, threat detection, monitoring tools, incident response tools and multiple forms of threat intelligence. Download your complimentary copy of “The Six Essential Capabilities of an Analytics-Driven SIEM” and learn how to dramatically improve your security posture, advanced threat detection and incident response.
Tags : 
     Splunk
By: Symantec     Published Date: Aug 09, 2013
The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks. Learn more.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology
     Symantec
By: Symantec     Published Date: Oct 07, 2014
The Internet Security Threat Report provides an overview and analysis of the year’s global internet threat activity. The report is based on data from the Symantec™ Global Intelligence Network, which Symantec’s analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape. Highlights from the 2014 Internet Security Threat Report Key Findings • 91% increase in targeted attacks campaigns in 2013 • 62% increase in the number of breaches in 2013
Tags : internet security, target attacks, breaches, threat activity, emerging trends, cybercrime, security
     Symantec
By: Symantec     Published Date: Oct 07, 2014
The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks.
Tags : intelligence, cyber security, threats, trends, malware, spam, business risks, security
     Symantec
By: Symantec     Published Date: Nov 21, 2014
The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks. Key Findings • The .doc file type was the most common attachment type used in spear-phishing attacks, making up more than 52.9 percent of all attachments in September. • The largest data breach reported in September actually took place in April, and resulted in the exposure of 56 million identities. • There were 600 vulnerabilities disclosed in the month of September, the highest number so far in 2014 and second-highest in the last 12 months.
Tags : cyber security threats, harmful business risks, malware, spam, intelligence team, security
     Symantec
By: Symantec     Published Date: Jun 18, 2015
Learn how to use actionable threat intelligence to protect your digital business and see how aligning your threat intel efforts with the goals and success factors of your digital business will greatly improve your company’s organizational goals.
Tags : actionable threat intelligence, digital business, information security, targeted cyber-attacks, security
     Symantec
By: Symantec     Published Date: Nov 30, 2015
Symantec has the most comprehensive source of Internet threat data in the world through the Symantec™ Global Intelligence Network, which is made up of more than 41.5 million attack sensors and records thousands of events per second.
Tags : 
     Symantec
By: Symantec     Published Date: Mar 14, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : symantec, security intelligence, attacks, cyber attacks, hackers, web security, data protection, targeted attacks
     Symantec
By: Symantec     Published Date: Nov 19, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape
     Symantec
By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape
     Symantec
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics