Whitepaper
Title
Client
Date
5 Reasons You Need a Modern ECM Approach

Companies need to move fast, adapt quickly, and innovate continuously. They must satisfy the demands o...
Alfresco Software Limited
2019-10-15
2017 Threat Report - Discussion Guide

The Cylance 2017 Threat Report offers valuable analysis on the current state of cybersecurity. The inf...
Blackberry Cylance
2019-10-10
Automate DevOps/SecOps deployment with CI/CD pipeline integrations

By focusing on frequent code integration, automated testing, and keeping the mainline code version in...
F5 Networks
2019-10-10
Artificial Intelligence In The Enterprise: The AI Race Is On

Artificial intelligence (AI) seems to be on everyone’s mind. It powers natural language recognition wi...
Blackberry Cylance
2019-10-10
Advanced Threat Prevention Test

Cylance commissioned AV-TEST to perform an advanced threat prevention test of enterprise endpoint prot...
Blackberry Cylance
2019-10-10
Using MITRE ATT&CK™ in Threat Hunting  and Detection

MITRE ATT&CK1 is an open framework and knowledge base of adversary tactics and techniques based on rea...
LogRhythm EMEA
2019-10-09
The Security Operations Maturity Model: Quick Reference Guide

Organisations should think of security operations as a critical business process. Effective security o...
LogRhythm EMEA
2019-10-09
LogRhythm for SWIFT Customer Security Controls Framework

Society for Worldwide Interbank Financial Telecommunication (SWIFT) facilitates a huge number of finan...
LogRhythm EMEA
2019-10-09
Defeating threats through user data: Applying UEBA to protect your environment

You’re facing a constant barrage of threats, some of which you don’t even know exist. The reality is t...
LogRhythm EMEA
2019-10-09