Popular Resources

Updated frequently, useful resources that can help you mature your security posture. Please borrow and share!

Previous
Next
Videos

How To Mitigate Insider Threats

What are Insider Threats and how do you mitigate this risk? Threat Hunter and Analyst, Kristen Yang, describes what they are and how you can protect your organization from them.
How To Mitigate Insider Threats
Datasheet

Threat Insight: Emerging Threats

While there is no specific checklist for classifying an emerging threat, these do generally share one or more of the following criteria...
Threat Insight: Emerging Threats
Videos

Security Maturity: A path to action

Director of Product Marketing, Aaron McIntosh, discusses ways to make security maturity improvement a priority for your organization.
Security Maturity: A path to action
Executive Summary

The ‘Hyperscale SOC’ and the Minds Behind It

This hyperscale SOC pushes the boundaries of machine learning and increases signal-to-noise in detections of ransomware attacks, suspicious scripting, cloud intrusions, and other threats. Check out this Executive Summary for more info!
The ‘Hyperscale SOC’ and the Minds Behind It
White Paper

The 'Hyperscale SOC' and the Minds Behind It

This whitepaper demonstrates that despite the hype of artificial intelligence, data science alone is no panacea — machine learning must be properly implemented and maintained, not just “bolted on” after the fact.
The 'Hyperscale SOC' and the Minds Behind It
Report

Top 10 Strategic Technology Trends for 2020: AI Security

“Through 2022, 30% of all AI cyberattacks will use training-data poisoning, AI model theft or adversarial samples to attack AI-powered systems”, according to Gartner. Read the Full Report here.
Top 10 Strategic Technology Trends for 2020: AI Security
Videos

Steps to Harden Your Microsoft Cloud

Threat Hunter and Analyst, Kristen yang, gives insight into the top 3 types of attacks used against cloud users, and tips on how to secure Azure or 365.
Steps to Harden Your Microsoft Cloud
Datasheet

Solution Brief: Cybersecurity Incident Response

What makes planning for incident response more difficult? Not all incidents are the same.
Solution Brief: Cybersecurity Incident Response
Videos

Fireside Chat: Mastering Security Maturity at your own pace

We discuss why it’s important to set realistic security expectations relative to your business and more.
Fireside Chat: Mastering Security Maturity at your own pace
123