Cyber Security

Content Security in the Cloud Era: Are UTMs Up to the Challenge?

The growth of cloud computing and the explosion of mobile devices are forcing dramatic changes in the way that networks are designed, conceived, and secured. Content security in particular faces novel challenges, as mobility and Web 2.0 applications make web traffic volumes highly unpredictable, with massive spikes and troughs from one moment to the next. […]

Barracuda Advanced Threat Protection

Barracuda Advanced Threat Protection (BATP) is a cloud-based service that provides in-depth defense against ransomware, malware, and advanced cyber attacks. It consists of multiple layers of detection, including signature, static, behavioral analysis—all the way to comprehensive sandboxing to provide accurate detection of a variety of polymorphic attacks. This cloud-based service has been integrated with all […]

CISOs Investigate: User Behaviour Analytics

CISOs Investigate: User Behaviour Analytics (UBA) includes interviews with 11 security leaders who have deployed or are looking to deploy third-party solutions. This report replaces the ad hoc, often informal and time-consuming processes of personally gathering peer insight. The report includes responses to Requests for Information (RFIs) submitted by eight vendors. Developed by CISOs, the […]

How to Build a Soc with Limited Resources

The purpose of this white paper is to show you how you can successfully build a SOC, even with limited resources. The paper first explains the basics of the Cyber Attack Lifecycle and the need to address it through the Threat Lifecycle Management framework. Next, the paper explains the basics of SOCs, providing details of […]

Definitive Guide to Security Intelligence and Analytics

As members of the security community, we’re already painfully aware of the sharp increase in major data breaches from glancing at the headlines, getting requests from management to explain the latest security issue, or even receiving notices that our own personal data has been compromised. We don’t need to be told that This book is […]

Detecting Compromised Systems

The external threat is one of the most high-profile risks that organisations face. Representing more than 80 percent of attacks today, external attackers look to take advantage of network and user weaknesses via malware, phishing, and advanced persistent threats (APT). Look in this paper for insights from LogRhythm and examples of how to best use […]

Why Data Modeling Is Still Relevant

There are those who think data modeling is passé or irrelevant. After all, data modeling theory is more than 30 years old and some data modeling tools have been around for 20 years. But data modeling is still essential. In fact, it may be more necessary now than ever. This whitepaper looks at several key […]


  • Favorite list is empty.
FavoriteLoadingClear favorites

Your favorite posts saved to your browsers cookies. If you clear cookies also favorite posts will be deleted.