The SC Blog
12th April at 2:00pm BST || Join us as we discuss what true Threat Intelligence is, and secondly, how your organisation can effectively integrate Threat Intelligence...
Sponsored by: SecureWorks
Centre for all IT-related crime content including data theft, ransomware, phishing and malware.
Centre for all content concerning IT infrastructures including cloud security and more.
Verdict: Solid threat intelligence product with a prodigious collection of resources. Fits well into just about threat and intelligence analysis tool set. At a price that is hard to beat, we make this our best Buy.
Verdict: In a sensitive environment – such as a financial institution that can afford the resource – this is a very solid contender. There is a whole lot to like about it and it may be one of the most powerful tools on the market.
Verdict: This is a good tool and certainly has a place in your analysis stack.
Verdict: We wish that Cyjax would use humans instead of computers to probe underground forums. Also, this is a bit pricey for what it offers. However, if you need open source intelligence with a bit of closed source thrown in, this is well worth your time to examine.
Verdict: If you need this level of analysis and if you can afford it, this is a solid choice for your cyber intel arsenal. We make it our Recommended choice.
Verdict: This has long been one of our favourite products and it is well worth considering.
Verdict: Good, well though-out tool and, if you are looking for out-of-the-box compliance capabilities, this one demands your attention.
Verdict: A powerful tool with a clear and important mission that it fulfills well. We make this our Recommended product this month.
Osterman Research: GDPR Compliance and Its Impact on Security and ...
The EU’s GDPR is triggering a change in how organizations need to protect personal data. Learn why compliance requires unprecedented levels of effort and what specific security measures...
Forrester Brief: You Need an Action Plan for GDPR
The Forrester Research Brief “You Need an Action Plan for the GDPR” helps your security, regulatory and privacy teams grasp five must-have changes necessary to comply with the GDPR...
Research Shows Office 365 Surging But Risks Remain
A recent study found 85% of respondents viewing email as critical to the organization. Whether you're already executing or planning a migration, this report reveals insights that...
2016 Global Encryption Trends Study
The 2016 Global Encryption Trends Study provides in-depth information about the role of encryption as a part of an overall data protection strategy and how its use results in an improved...