Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...
CLEAR

White Paper | Presented by FireEye

The SIEM That Cried Wolf

When security teams are only able to investigate 29% of malware alerts, how are you ensuring your SIEM is prioritizing the most important ones?

White Paper | Presented by FireEye

Taking Control of Security Operations

In this white paper, Taking Control of Security Operations, you will: - Learn how to improve visibility and make sense of your alert volume - Discover how to understand and anticipate attacker behavior - Find out how to integrate and automate your products and processes

Miscellaneous | Presented by FireEye

The SIEM That Cried Wolf

Check out this infographic and learn how to enhance your SIEM and move from alert to fix faster.

White Paper | Presented by Expanse

YOUR NEW ATTACK SURFACE: Discover, Track, and Manage the Assets That Attackers Target

Download our latest white paper, Your New Attack Surface, to learn, why the Internet attack surface is the most critical part of your Internet presence to focus on, the most common causes of cyber breaches and how to prevent them, as well as valuable strategies on how to reduce your overall risk profile.

White Paper | Presented by Expanse

DISCOVER AND MONITOR YOUR INTERNET ASSETS

In this brief you will learn why you need a single source of truth for Internet-connected assets on-prem and in the cloud, how IT operations and security teams benefit from Expanse, as well as how you can reduce third-party risk with Expanse.

White Paper | Presented by Expanse

5 COMMON PERIMETER EXPOSURES AND WHAT YOU CAN DO ABOUT THEM

Download this white paper to learn the five most common exposures and proactive steps you can take to protect your network.

Miscellaneous | Presented by Expanse

DISCOVER AND TRACK YOUR CLOUD FOOTPRINT

Download our new tech brief, Discovering Your Total Cloud Footprint, to understand how to reduce your attack surface by integrating a continuous, outside-in perspective of all of your cloud assets, including those living in unmanaged accounts across all cloud providers.

White Paper | Presented by Carbon Black

How a Prominent Cryptomining Botnet is Paving the Way for a Lucrative and Illicit Revenue Model

Carbon Black’s (CB) Threat Analysis Unit (TAU) has uncovered a secondary component in a well-known cryptomining campaign.

White Paper | Presented by Red Hat

Security and Compliance Automation for Financial Services

As organizations increasingly turn to hybrid public and private clouds to ensure uptime, accelerate innovation, and meet customer service demands, they confront a unique set of security challenges.

White Paper | Presented by eSentire

The Vulnerable Landscape: Metrics, Insights and Impact for Security Leaders

Review the report on the probability of your organization being exploited and how to remediate before your business is disrupted.

Load More