HR Hero Your Employment Law Resource
 

security intelligence

Results 126 - 150 of 319Sort Results By: Published Date | Title | Company Name
Published By: Recorded Future     Published Date: Feb 13, 2019
There are plenty of misconceptions about what threat intelligence is. The most common (but slightly misguided) assumptions risk leading many security pros to believe that threat intelligence doesn’t have an advantage to bring into their particular role. In this white paper, explore how threat intelligence can be operationalized in a variety of roles, demonstrating the central part it can play in a proactive security strategy. You’ll also uncover: • Key threat intelligence attributes to power vulnerability management • 4 major challenges for incident response teams • 3 threat intelligent commandments • 4 pain points identified by security leaders And more
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Feb 13, 2019
This white paper outlines current approaches to implementing SIEM and enriching security products with threat intelligence
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Feb 13, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Feb 13, 2019
This white paper outlines current approaches to implementing SIEM and enriching security products with threat intelligence.
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Feb 13, 2019
There are plenty of misconceptions about what threat intelligence is. The most common (but slightly misguided) assumptions risk leading many security pros to believe that threat intelligence doesn’t have an advantage to bring into their particular role. In this white paper, explore how threat intelligence can be operationalized in a variety of roles, demonstrating the central part it can play in a proactive security strategy. You’ll also uncover: • Key threat intelligence attributes to power vulnerability management • 4 major challenges for incident response teams • 3 threat intelligent commandments • 4 pain points identified by security leaders And more
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Apr 18, 2019
Supercharge Your Security Alert fatigue is the desensitization that comes from being bombarded with too many alerts — a sense of hopelessness from being overwhelmed by tasks and not knowing where to begin. If an overabundance of security alerts is tiring you out, check out our new e-book, “5 Ways to Supercharge Your Security With Threat Intelligence.” It shows exactly how to use threat intelligence to get the context you need to do something with all that data.
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Apr 18, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Apr 18, 2019
This white paper outlines current approaches to implementing SIEM and enriching security products with threat intelligence.
Tags : 
    
Recorded Future
Published By: Logrhythm     Published Date: Feb 24, 2016
The time has come for CEOs and Boards to take personal responsibility for improving their companies’ cyber security. Global payment systems, private customer data, critical control systems, and core intellectual property are all at risk today. As cyber criminals step up their game, government regulators get more involved, litigators and courts wade in deeper, and the public learns more about cyber risks, corporate leaders will have to step up accordingly. This whitepaper focuses on the LogRhythm Security Intelligence Maturity Model, and how it is a valuable guide for building the necessary successive layers of threat detection and response capabilities. Download this paper now to find out more.
Tags : 
cyber attack, risk, cyber security, cyber criminals, cyber risks, security intelligence, threat detection
    
Logrhythm
Published By: Logrhythm     Published Date: Feb 24, 2016
This eBook looks at different threat sharing initiatives and alliances as well as explores how automating intelligence sharing will significantly accelerate detection and response times.
Tags : 
cyberthreat, cyberthreat intelligence, security, it solutions, cti companies, cti intelligence
    
Logrhythm
Published By: Dell SecureWorks     Published Date: Apr 11, 2011
Read this whitepaper to understand how Dell SecureWorks can help your midsize organization improve security, increase operational efficiency and demonstrate compliance with regulatory requirements, allowing you to focus on the priorities and strategic projects that drive your business.
Tags : 
dell secureworks, internet security, compliance, regulatory compliance, vulnerability, security intelligence, global threats, cyber attack
    
Dell SecureWorks
Published By: McAfee EMEA     Published Date: Nov 15, 2017
In response to an increasingly complex IT ecosystem and expanding attack surface, Intel Security offers a unified threat defense lifecycle. Intel Security delivers an integrated, connected architecture that dramatically increases speed and capacity of organizations to prevent and respond to attacks. Our architecture reduces complexity and improves operational efficiency, providing critical integrated, adaptive, and orchestrated intelligence and response capabilities. This empowers customers to block threats more effectively, identify compromises, and implement quick remediation and stronger countermeasures.
Tags : 
security information, event management, orchestration, surface, intel security
    
McAfee EMEA
Published By: McAfee EMEA     Published Date: Mar 14, 2018
Machine learning is all around us, from our smart home applications to driverless automobiles. The efficiency of automated decision-making is changing the game in cybersecurity, expanding the capabilities of humans by sifting through enormous quantities of data and presenting it as actionable intelligence. Machine learning makes security teams better, and vice versa. Human-machine teams deliver the best of both worlds, allowing endpoint security to continually evolve to stop new attack tactics. Your team deserves the best that cybersecurity has to offer, and today the best endpoint security products leverage machine learning.
Tags : 
    
McAfee EMEA
Published By: Darktrace     Published Date: Apr 02, 2019
As organizations increasingly rely on cloud services and SaaS applications to streamline business practices, the familiar paradigm of the network perimeter has dissolved, leaving a porous and ever-changing digital estate in its wake. While the benefits of cloud computing will ensure that migrations continue apace, the unique security challenges presented by the cloud will not only require a more agile mindset, but also self-learning technologies that can move at the speed of cloud deployments and spot subtle deviations indicative of a threat, while providing complete, real-time visibility across the digital business. Darktrace’s world leadership in the field of artificial intelligence for cyber security makes it the most effective and proven solution to detect unprecedented threats and anomalous cyber-incidents in the cloud. Whether faced with an insider threat, an attacker targeting sensitive data in test containers, or a significant misconfiguration that could be exploited in the fut
Tags : 
    
Darktrace
Published By: Panda Security     Published Date: Jan 16, 2008
A new white paper from Panda Security discusses the new breed of silent online threats that can bypass traditional antivirus programs and penetrate even the most highly 'protected' networks.  Additionally, the sheer volume of malware has overwhelmed the antivirus industry as a whole. Collective Intelligence is a new global security model specifically designed to combat the next evolution of malicious code.
Tags : 
malware, virus, anti-virus, spyware, anti-spyware, anti-malware, bot, botnet, trojan, dos, denial of service, hacker, phish, phishing, panda, panda security
    
Panda Security
Published By: EMC Corporation     Published Date: Mar 20, 2014
New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle a much greater volume and wider scope of data than at present.
Tags : 
emc, big data, incident response, malware detection, security journey, reduce risk, improve security, budget constraints, threat intelligence
    
EMC Corporation
Published By: EMC Corporation     Published Date: Mar 20, 2014
Big data security analytics is no longer a visionary idea -- leading enterprises recognize that their immediate security requirements demand this type of solution.
Tags : 
emc, big data, incident response, malware detection, security journey, reduce risk, improve security, budget constraints, threat intelligence
    
EMC Corporation
Published By: EMC Corporation     Published Date: Mar 20, 2014
Starting with a foundational set of data management and analytic capabilities enables organizations to effectively build and scale security management as the enterprise evolves to meet Big Data challenges.
Tags : 
emc, big data, incident response, malware detection, security journey, reduce risk, improve security, budget constraints, threat intelligence
    
EMC Corporation
Published By: EMC Corporation     Published Date: Mar 20, 2014
This paper details why organization needs to shift more security resources from preventing intrusion toward rapid threat detection and remediation, and the intelligence-driven security approach that is required to do so.
Tags : 
emc, incident response, malware detection, security journey, reduce risk, improve security, budget constraints, threat intelligence
    
EMC Corporation
Published By: EMC Corporation     Published Date: Mar 20, 2014
Mid-size enterprises face the challenges of managing advanced threats plus staff and budget constraints. This on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small.
Tags : 
emc, incident response, malware detection, security journey, reduce risk, improve security, budget constraints, threat intelligence
    
EMC Corporation
Published By: Secunia     Published Date: Oct 12, 2011
This paper discusses the limitations of security and highlights how cybercriminals can achieve their goals without administrative access.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence, solutions, inspector, software, secure, vital, protect, networks, endpoints, zeroboard, patch, patch manager, tools
    
Secunia
Published By: Secunia     Published Date: Oct 12, 2011
Measurements within this white paper demonstrate that an intelligent patching strategy is an effective approach for reducing vulnerability risks.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence, solutions, inspector, software, secure, vital, protect, networks, endpoints, zeroboard, patch, patch manager, tools
    
Secunia
Published By: Secunia     Published Date: Oct 12, 2011
This paper discusses the vulnerable components of SCADA systems based on analysis from Secunia while verifying the reported reported vulnerabilities.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence, solutions, inspector, software, secure, vital, protect, networks, endpoints, zeroboard, patch, patch manager, tools
    
Secunia
Published By: Secunia     Published Date: Oct 12, 2011
This study identifies the 3rd party program vulnerabilities and the threat they represent.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence, solutions, inspector, software, secure, vital, protect, networks, endpoints, zeroboard, patch, patch manager, tools
    
Secunia
Published By: Vertica     Published Date: Dec 09, 2008
BlueCrest Capital Management is a leading European hedge fund, with $15B in assets-under-management. Learn how BlueCrest uses Vertica Analytic DBMS to obtain real-time analysis while simultaneously loading vast amounts of new market data.
Tags : 
vertica, data management, data warehousing, dbms, data mining, data source, data, security, business intelligence
    
Vertica
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Social Networks:
Employers Forum
facebook
Twitter
YouTube
© 2019 BLR®—Business & Legal Resources. All rights reserved. 800-274-6774


Infinite Menus, Copyright 2006, OpenCube Inc. All Rights Reserved.