SIEM Reports

GoSecure Cybersecurity Perceptions Versus Reality
sponsored by GoSecure
WHITE PAPER: This 29-page research report provides the key findings from a recent GoSecure survey designed to better understand the biases, gaps and misconceptions surrounding cybersecurity. Read on to learn more about this disconnect and discover how to address and overcome it.
Posted: 08 Feb 2021 | Published: 16 Sep 2020

GoSecure

APT-Style Attacks: How Cybercriminals are Using Them
sponsored by WatchGuard Technologies, Inc.
EGUIDE: New research shows cybercriminals are using more advanced attack techniques. In this e-guide, security expert Nick Lewis explains what enterprises need to know about the APT-style attacks.
Posted: 17 Jan 2017 | Published: 12 Jan 2017

WatchGuard Technologies, Inc.

Building an Application Security Program: Why Education is Key
sponsored by tCell
EGUIDE: Gain insight into what an application security program might look like as it develops and what experts have to say about what it could mean for the future of application development.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell

Kaspersky Lab’s COVID-19 Relief Initiatives
sponsored by Kaspersky
EGUIDE: Amid the stress caused by the COVID-19 pandemic, it’s nice to know that there are companies out there offering resources and assistance to organizations heavily affected. Download this e-guide to unlock 2 articles highlighting current COVID-19 relief initiatives at Kaspersky Lab.
Posted: 06 Jul 2020 | Published: 29 Jun 2020

Kaspersky

The Truth After the Hype: Improve Mobile Data Security
sponsored by vmware airwatch
EGUIDE: In this expert guide, learn how to strengthen your defenses against mobile security breaches with encryption, containerization and more. Discover the new, common vulnerabilities mobile devices and data face and best practices to manage them moving forward.
Posted: 11 Oct 2016 | Published: 10 Oct 2016

vmware airwatch

SIEM Analyst Research Bundle
sponsored by AT&T Cybersecurity
WHITE PAPER: No matter the company size, a properly executed SIEM strategy is difficult to achieve as resources become constrained. Explore this white paper to uncover the key factors leading to a successful SIEM purchase and deployment for your organization.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

AT&T Cybersecurity

Insider Security Threats: What CISOs Can Do to Mitigate Them
sponsored by Preempt Security
EGUIDE: Insider security threats will always exist, but there are steps you can take to limit their impact. Discover how to implement technical access control and authentication to ensure only the right eyes are consuming sensitive data.
Posted: 07 Nov 2016 | Published: 01 Nov 2016

Preempt Security

Container Security: How to Secure Enterprise Container Stacks
sponsored by NeuVector
EGUIDE: Learn the basics of container security and how to best secure your container stacks. Discover tools available to plug potential security holes and strategies to keep your organization secure.
Posted: 05 Dec 2016 | Published: 02 Dec 2016

NeuVector

Cybersecurity skills shortage demands new workforce strategies
sponsored by IBM
EGUIDE: The race to find InfoSec professionals who can outpace advanced threats has companies worldwide facing hurdles. This e-guide discusses organizations' want for better qualified candidates and reveals what skills exactly most security professionals are currently lacking.
Posted: 23 Jun 2016 | Published: 21 Jun 2016

IBM

How to Improve SIEM Systems with Machine Learning
sponsored by LogRhythm, Inc.
EGUIDE: In this e-guide, security expert Karen Scarfone dives into how machine learning can improve the effectiveness of SIEM systems.
Posted: 15 Feb 2018 | Published: 07 Feb 2018

LogRhythm, Inc.