Archivio whitepaper

Argomenti più recenti:

Automate DevOps/SecOps deployment with CI/CD pipeline integrations

By focusing on frequent code integration, automated testing, and keeping the mainline code version in a state that is deployable to production at any time, CI/CD aims to eliminate the risks and friction of traditional waterfall...

Visualizza whitepaper

Artificial Intelligence In The Enterprise: The AI Race Is On

Artificial intelligence (AI) seems to be on everyone’s mind. It powers natural language recognition within voice-powered assistants like Siri and Alexa, beats world-class Go players (Google AlphaGo), and enables hyper-targeted ...

Visualizza studio

Advanced Threat Prevention Test

Cylance commissioned AV-TEST to perform an advanced threat prevention test of enterprise endpoint protection software. The testing methodology was developed jointly to provide additive testing to the commodity Anti-Virus protec...

Visualizza studio

Using MITRE ATT&CK™ in Threat Hunting and Detection

MITRE ATT&CK1 is an open framework and knowledge base of adversary tactics and techniques based on real-world observations. ATT&CK provides a common taxonomy of the tactical objectives of adversaries and their methods. ...

Visualizza whitepaper

The Security Operations Maturity Model: Quick Reference Guide

Organisations should think of security operations as a critical business process. Effective security operations are the first line of defence when it comes to preventing cyberattacks. To accomplish this, organisations need matu...

Visualizza whitepaper

LogRhythm for SWIFT Customer Security Controls Framework

Society for Worldwide Interbank Financial Telecommunication (SWIFT) facilitates a huge number of financial transactions every day via the secure messaging system it provides to its members. In addition to banks, the system is a...

Visualizza whitepaper

Defeating threats through user data: Applying UEBA to protect your environment

You’re facing a constant barrage of threats, some of which you don’t even know exist. The reality is that your users are behind many threats and breaches — whether maliciously or accidentally. Case in point: 69 per cent of orga...

Visualizza whitepaper

Budgeting for a modern SIEM: A guide to managing financial risk

For CEOs, growth is a welcome challenge — it’s an indicator that business is healthy. But growth also poses a real challenge for CISOs for two reasons: First, when budgeting for a security information and event management (SIEM...

Visualizza whitepaper

Definitive guide to SOAR

Cybersecurity organizations have their work cut out for them. As the last line of defense in the fight against cyberthreats, they stand between their corporations’ valuable IT assets and cyberattackers. But these attackers aren...

Visualizza whitepaper

Smart Manufacturing in the Digital Factory.

The digitization of production towards Smart Factory presents great challenges, especially for small and medium-sized enterprises (SMEs). They need to integrate new digital solutions into running production systems and involve ...

Visualizza whitepaper
Registrati alla newsletter
Le principali notizie, gratuitamente via mail