WHITE PAPERS & BRIEFS
Reducing Attacker Dwell Time
This white paper examines why adversaries are successful in persisting in networks; the limitations of existing security technologies and methodologies to discover threats once they are inside; and how dedicated hunt technology and processes can work with your existing security infrastructure to deny attackers the ability to persist undetected.
Assessing Cybersecurity Risk in a Breached World
This white paper introduces the role and need for the Compromise Assessment, a new class of security assessment which seeks to identify unknown security breaches and adversary presence within a network. It also demonstrates how the latest “hunt” methodologies and technologies can be best applied to deliver a rapid and effective compromise assessment, giving information risk managers unparalleled fidelity and confidence into the status of their networks.
2017 Threat Hunting Survey
Download the Crowd Research Partners 2017 Threat Hunting Report to gain critical insights into the new practice of cyber threat hunting as an emerging line of defense to combat advanced cybersecurity threats.
Uncovering a Major Hidden Risk of GDPR Legislation
All companies in Europe today are focused on GDPR compliance. The smart ones are approaching the preparation for future compliance in a methodical and phased way, beginning with an assessment of the current data protection measures in place and identifying gaps or other threats to data security. What is alarming about the GDPR legislation, as it is written, are the hidden risks that will threaten companies that believe themselves compliant, but may unwittingly be missing the bar for compliance.
Security Operations Center Top Concerns
A recent Report on Threat Hunting published by Crowd Research Partners indicated while 75% of respondents believe that threat hunting is of major importance, and 42% consider it a top priority, there are specific concerns that stand out. This brief looks at the top 7 concerns reported and shows how threat hunting with Infocyte HUNT helps to address these issues.
Africa, Technology and the Threat of Malware
The rapid expansion of IT connectivity and businesses in Africa has led to the continent becoming a high value target for cyber-attacks of all kinds. This brief looks at the security challenges facing the region, as well as solutions to put proactive security practices in place to mitigate cyber threats in African countries.