Below you will find reports with the tag of “Network Intrusion” Data Breach Reports: May 31, 2018 This report provides a comprehensive list of all the data breaches that have occurred in the spring of 2018. Added: October 26, 2018 The ABC's Of Inline Security The goal of this book is to clarify the most frequently encountered concepts of inline security and be a resource as you develop your network security architecture. For each of the 20 terms included, they provide a simple definition, common use cases, and important considerations for deployment. (more available) Added: October 26, 2018 Threat Intelligence Executive Report 2018: Volume 2 This Threat report details some early 2018 threats like ransomware, North Korean hacking, the leveraging of newly exposed vulns. Added: October 26, 2018 2015 Trustwave Global Security Report The writers of this report invite you to use the knowledge contained in this report to become your own master battlefield tactician, by getting to know your enemies in the cyber universe. (more available) Added: October 25, 2018 2018 Incident Response Insights Report This report shares insights and valuable lessons from an examination of the threats in 2017. Added: October 25, 2018 Crowdstrike Services Casebook Report 2017 This report provides key takeaways that can inform both executive stakeholders and security professionals how to respond to intrusions more effectively. Most importantly, it offers recommendations that organizations can implement proactively — right now — to improve their ability to prevent, detect and respond to attacks. (more available) Added: October 25, 2018 Definitive Guide To Cloud Thread Protection In this eBook, they will discuss the state of cloud threat protection and why it needs a new approach, and take a deep dive into the underlying technologies and must-have components powering effective cloud threat protection. They will then identify the data sources needed in order to gain the type of granular visibility that can ensure successful cloud threat protection and deployment paths for enforcing safe cloud access. Next, they will outline proven best practices around threat protection being employed in real-world enterprises today. (more available) Added: October 25, 2018 How to dramatically improve corporate IT without spending millions This research presets a list of vectors commonly used by attackers to compromise internal networks after achieving initial access. It delivers recommendations on how to best address the issues. The goal is to help defenders focus efforts on the most important issues by understanding the attackers’ playbook, thereby maximizing results. (more available) Added: October 25, 2018 Incapsula Survey: What DDoS Attacks Really Cost Businesses To determine real-world costs posed by DDoS attacks in 2014, Incapsula commissioned a survey to gauge real organizations’ experiences with them. By compiling these statistics, they hoped to provide some perspective. Additionally, they wanted to underscore the importance of investing in a truly impenetrable mitigation solution. (more available) Added: October 25, 2018 Secure The App Not The Device This report seeks to help the reader understand why, “Security should accelerate mobile adoption, not prevent it.” Added: October 25, 2018 The Deserialization Problem This paper answers questions about what the deserialization vulnerability is, and what the challenges are to solving it. Added: October 25, 2018 Threat Intelligence Executive Report 2017: Volume 2 This threat report takes a look at some of the events of spring 2017. Specifically, it looks at the NICKEL GLADSTONE threat group, the Iranian COBALT GYPSY threat group, third party risks, limiting native operating system admin tools. (more available) Added: October 25, 2018 2015 Breach Preparedness and Response Study In 2013, ISMG and FireEye teamed up to survey security leaders about advanced threats and breach response. Among the findings: Only 20 percent of respondents rated their incident response programs “very effective,” and they were most concerned about their abilities to detect and contain APT/malware quickly and completely. (more available) Added: October 24, 2018 2016 Cyber Threat Study This study, analyzes cyber threats from the years 2014 through 2016. Added: October 24, 2018 2017 Security Operations Center Survey This report discusses the Security Operations Center and how it is being architected in organizations with some consensus on what should be done. The paper details the issues and problems that need to be resolved as this area of expertise continues to grow. (more available) Added: October 24, 2018 2018 Global Threat Report:Blurring The Lines Between Statecraft and Tradecraft The issues presented in this 2018 report are Targeted Intrusions, Criminal and Hacktivist Activity, and 2018 Predictions Added: October 24, 2018 Cyber Espionage Is Alive And Well APT32 This blog post discusses APT32 and it’s targetting of global corporations for destruction. Added: October 24, 2018 Definitive Guide To AWS This is an eBook that discusses securing ata on Amazon Web Services (AWS). Added: October 24, 2018 Russian Federation Country Profile 2017 This paper gives a profile of the Russian Federation. Added: October 24, 2018 Securing Information In The Age Of Collaboration This report presents the results of a survey run by ESG and commissioned by Seclore. They analyze information related to data, data security, and collaboration. (more available) Added: October 24, 2018 Shelltea + Poslurp Memory-Resident Point-Of-Sale Malware Attacks Industry This paper discusses the specific issue of malware that attacks Point-Of-Sale systems. Added: October 24, 2018 «« « 5 6 7 8 9 » »»
Data Breach Reports: May 31, 2018 This report provides a comprehensive list of all the data breaches that have occurred in the spring of 2018. Added: October 26, 2018
The ABC's Of Inline Security The goal of this book is to clarify the most frequently encountered concepts of inline security and be a resource as you develop your network security architecture. For each of the 20 terms included, they provide a simple definition, common use cases, and important considerations for deployment. (more available) Added: October 26, 2018
Threat Intelligence Executive Report 2018: Volume 2 This Threat report details some early 2018 threats like ransomware, North Korean hacking, the leveraging of newly exposed vulns. Added: October 26, 2018
2015 Trustwave Global Security Report The writers of this report invite you to use the knowledge contained in this report to become your own master battlefield tactician, by getting to know your enemies in the cyber universe. (more available) Added: October 25, 2018
2018 Incident Response Insights Report This report shares insights and valuable lessons from an examination of the threats in 2017. Added: October 25, 2018
Crowdstrike Services Casebook Report 2017 This report provides key takeaways that can inform both executive stakeholders and security professionals how to respond to intrusions more effectively. Most importantly, it offers recommendations that organizations can implement proactively — right now — to improve their ability to prevent, detect and respond to attacks. (more available) Added: October 25, 2018
Definitive Guide To Cloud Thread Protection In this eBook, they will discuss the state of cloud threat protection and why it needs a new approach, and take a deep dive into the underlying technologies and must-have components powering effective cloud threat protection. They will then identify the data sources needed in order to gain the type of granular visibility that can ensure successful cloud threat protection and deployment paths for enforcing safe cloud access. Next, they will outline proven best practices around threat protection being employed in real-world enterprises today. (more available) Added: October 25, 2018
How to dramatically improve corporate IT without spending millions This research presets a list of vectors commonly used by attackers to compromise internal networks after achieving initial access. It delivers recommendations on how to best address the issues. The goal is to help defenders focus efforts on the most important issues by understanding the attackers’ playbook, thereby maximizing results. (more available) Added: October 25, 2018
Incapsula Survey: What DDoS Attacks Really Cost Businesses To determine real-world costs posed by DDoS attacks in 2014, Incapsula commissioned a survey to gauge real organizations’ experiences with them. By compiling these statistics, they hoped to provide some perspective. Additionally, they wanted to underscore the importance of investing in a truly impenetrable mitigation solution. (more available) Added: October 25, 2018
Secure The App Not The Device This report seeks to help the reader understand why, “Security should accelerate mobile adoption, not prevent it.” Added: October 25, 2018
The Deserialization Problem This paper answers questions about what the deserialization vulnerability is, and what the challenges are to solving it. Added: October 25, 2018
Threat Intelligence Executive Report 2017: Volume 2 This threat report takes a look at some of the events of spring 2017. Specifically, it looks at the NICKEL GLADSTONE threat group, the Iranian COBALT GYPSY threat group, third party risks, limiting native operating system admin tools. (more available) Added: October 25, 2018
2015 Breach Preparedness and Response Study In 2013, ISMG and FireEye teamed up to survey security leaders about advanced threats and breach response. Among the findings: Only 20 percent of respondents rated their incident response programs “very effective,” and they were most concerned about their abilities to detect and contain APT/malware quickly and completely. (more available) Added: October 24, 2018
2016 Cyber Threat Study This study, analyzes cyber threats from the years 2014 through 2016. Added: October 24, 2018
2017 Security Operations Center Survey This report discusses the Security Operations Center and how it is being architected in organizations with some consensus on what should be done. The paper details the issues and problems that need to be resolved as this area of expertise continues to grow. (more available) Added: October 24, 2018
2018 Global Threat Report:Blurring The Lines Between Statecraft and Tradecraft The issues presented in this 2018 report are Targeted Intrusions, Criminal and Hacktivist Activity, and 2018 Predictions Added: October 24, 2018
Cyber Espionage Is Alive And Well APT32 This blog post discusses APT32 and it’s targetting of global corporations for destruction. Added: October 24, 2018
Definitive Guide To AWS This is an eBook that discusses securing ata on Amazon Web Services (AWS). Added: October 24, 2018
Russian Federation Country Profile 2017 This paper gives a profile of the Russian Federation. Added: October 24, 2018
Securing Information In The Age Of Collaboration This report presents the results of a survey run by ESG and commissioned by Seclore. They analyze information related to data, data security, and collaboration. (more available) Added: October 24, 2018
Shelltea + Poslurp Memory-Resident Point-Of-Sale Malware Attacks Industry This paper discusses the specific issue of malware that attacks Point-Of-Sale systems. Added: October 24, 2018