ISTR Ransomware 2017

The ransomware landscape shifted dramatically this year with the appearance of two new selfpropagating threats in the form of WannaCry and Petya. Both outbreaks caused global panic, catching many organizations off-guard, with infections spreading rapidly across corporate networks.

Spotlight

Tychon

Tychon is an advanced endpoint management platform that unifies security hygiene and asset management and puts real-time control in the hands of both the operations and security teams. Tychon has you covered, from the endpoint to the cloud, empowering your organization. Tychon drives greater efficiency for your security and systems management teams by giving operators instant visibility and control over all your endpoints, and the speed in response to make that valuable. Simply ask questions in plain english and within seconds, query your entire enterprise for anything from advanced/polymorphic malware and vulnerabilities to server and software license utilization.

OTHER WHITEPAPERS
news image

Identity and Zero Trust: A Health-ISAC Guide for CISOS

whitePaper | August 25, 2022

These days, you can’t have a conversation about cybersecurity without talking about zero trust. The security concept requires that all individuals and devices on a network be continuously authenticated, authorized, and monitored. Gone are the days of letting someone in the front door, giving them a role with access privileges and then having them go about their merry way.

Read More
news image

Security, privacy, and compliance with Illumina Connected Analytics

whitePaper | August 23, 2022

Advances in next-generation sequencing (NGS) technologies have dramatically increased the amount of data generated, creating challenges in data analysis and interpretation. Illumina Connected Analytics (ICA) is a secure genomic data platform to operationalize informatics and drive scientific insights. ICA provides an extensible platform with a rich set of RESTful application program interfaces (APIs) and a command-line interface (CLI) tool to maximize workflow efficiency.

Read More
news image

AWS Best Practices for DDoS Resiliency

whitePaper | December 5, 2019

You work to protect your business from the impact of Distributed Denial of Service (DDoS) attacks, as well as other cyberattacks. You want to keep your customers’ trust in your service by maintaining the availability and responsiveness of your application. And you want to avoid unnecessary direct costs when your infrastructure must scale in response to an attack.

Read More
news image

XDR vs. SIEM: A Cybersecurity Leader’s Guide

whitePaper | December 27, 2022

As threats intensify and SecOps teams are called upon to defend digital environments that keep growing in size and complexity, and with a defensible perimeter that has all but disappeared, cybersecurity vendors are responding with a new generation of software and service solutions.

Read More
news image

Brivo Access Information Security White Paper

whitePaper | August 26, 2022

As a provider of physical security services, we at Brivo believe that information security is of paramount importance to maintaining the safety and security of your facilities, and the privacy of your data. That’s why information security has been a consideration since day one.

Read More
news image

Citrix Cloud Services Data Protection Overview

whitePaper | September 29, 2022

Citrix understands that data protection is one of the top priorities for our customers when selecting a cloud service. Data protection is also a rapidly-evolving domain and requires enterprises to assess more information over time about the data handling practices of their vendors.

Read More

Spotlight

Tychon

Tychon is an advanced endpoint management platform that unifies security hygiene and asset management and puts real-time control in the hands of both the operations and security teams. Tychon has you covered, from the endpoint to the cloud, empowering your organization. Tychon drives greater efficiency for your security and systems management teams by giving operators instant visibility and control over all your endpoints, and the speed in response to make that valuable. Simply ask questions in plain english and within seconds, query your entire enterprise for anything from advanced/polymorphic malware and vulnerabilities to server and software license utilization.

Events