Top White Papers and Webcasts

  • The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new security tool is released, threat actors strive to develop a way around it.  One advanced threat technique that is experiencing success is the use of fileless attacks, where no executable file is written to disk.     The 2017 Verizon Data Breach Investigations Report found that 51 percent of cyberattacks are malware-free, so there’s no indication that these attacks …

  • Many IT security organizations spend too much time navigating manual processes instead of responding to vulnerabilities, which leaves them open to attack. Is the answer to improving response times hiring more staff? Or is it automation?   Join Jonathan Walker from ServiceNow, as he reviews data from a recent survey conducted by The Ponemon Institute around vulnerability management. Jonathan will discuss how improving your response to vulnerabilities is about more than hiring additional staff or …