Whitepaper
Titel
Klient
Datum
Die nächste Welle: Bot-gesteuerte Brute-Force-Angriffe

Der Schutz von Benutzeridentitäten und die Verwaltung von Zugriffsberechtigungen für kritische Geschäf...
F5 Networks
2019-10-10
Advanced Threat Prevention Test

Cylance commissioned AV-TEST to perform an advanced threat prevention test of enterprise endpoint prot...
Blackberry Cylance
2019-10-10
Immer noch mehr automatisierte Angriffe - Bot-Management in der Welt von heute

Wer hat sich nicht schon einmal eine Armee von Klonen gewünscht, die all die undankbaren Aufgaben und ...
F5 Networks
2019-10-10
Using MITRE ATT&CK™ in Threat Hunting  and Detection

MITRE ATT&CK1 is an open framework and knowledge base of adversary tactics and techniques based on rea...
LogRhythm EMEA
2019-10-09
The Security Operations Maturity Model: Quick Reference Guide

Organisations should think of security operations as a critical business process. Effective security o...
LogRhythm EMEA
2019-10-09
LogRhythm for SWIFT Customer Security Controls Framework

Society for Worldwide Interbank Financial Telecommunication (SWIFT) facilitates a huge number of finan...
LogRhythm EMEA
2019-10-09
Defeating threats through user data: Applying UEBA to protect your environment

You’re facing a constant barrage of threats, some of which you don’t even know exist. The reality is t...
LogRhythm EMEA
2019-10-09
Budgeting for a modern SIEM: A guide to managing financial risk

For CEOs, growth is a welcome challenge — it’s an indicator that business is healthy. But growth also ...
LogRhythm EMEA
2019-10-09
Definitive guide to SOAR

Cybersecurity organizations have their work cut out for them. As the last line of defense in the fight...
LogRhythm EMEA
2019-10-09