Бяла книга
Заглавие
Клиент
Дата
Automate DevOps/SecOps deployment with CI/CD pipeline integrations

By focusing on frequent code integration, automated testing, and keeping the mainline code version in...
Artificial Intelligence In The Enterprise: The AI Race Is On

Artificial intelligence (AI) seems to be on everyone’s mind. It powers natural language recognition wi...
Blackberry Cylance
2019-10-10
Advanced Threat Prevention Test

Cylance commissioned AV-TEST to perform an advanced threat prevention test of enterprise endpoint prot...
Blackberry Cylance
2019-10-10
Using MITRE ATT&CK™ in Threat Hunting  and Detection

MITRE ATT&CK1 is an open framework and knowledge base of adversary tactics and techniques based on rea...
The Security Operations Maturity Model: Quick Reference Guide

Organisations should think of security operations as a critical business process. Effective security o...
LogRhythm for SWIFT Customer Security Controls Framework

Society for Worldwide Interbank Financial Telecommunication (SWIFT) facilitates a huge number of finan...
Defeating threats through user data: Applying UEBA to protect your environment

You’re facing a constant barrage of threats, some of which you don’t even know exist. The reality is t...
Budgeting for a modern SIEM: A guide to managing financial risk

For CEOs, growth is a welcome challenge — it’s an indicator that business is healthy. But growth also ...
Definitive guide to SOAR

Cybersecurity organizations have their work cut out for them. As the last line of defense in the fight...