Featured

Whitepapers are partner-offered informational research documents that provide technical and operational data, case studies, and timely views and explanations to help keep your organization safe.

Threat Hunting: Answering “Am I Under Attack?”

Threat hunting returns to the basic tenets of information security: reviewing your IT environment for signs of malicious activity and operational deficiencies. Download this whitepaper to answer the question, “Am I under attack?”

Recommended

Building the Digital Workspace

Is there value in digital workplace strategies? Oxford Economics and Citrix surveyed 600 executives globally to answer this question. The findings will change your perspective.

5 Steps to Quantifying Insider Risk

A practical guide to assessing, detecting and preventing insider threats.

Transitioning from Managed Services to Managed Security

Transitioning from MSP to MSSP is a well-trodden path and there are a lot of best practices to increase success. Download this whitepaper to find the current state of the market for MSSPs and the best practices for new MSSPs.

Ransomware: Four Ways to Protect Data Now

Hackers are targeting organizations with malware to encrypt crucial data, holding it hostage until payment is made. This white paper presents 4 ways to reduce exposure to ransomware, and recover data more quickly and effectively.

2017 Threat Hunting Survey Report

Organizations realize threat hunting is the next step in the evolution of the modern Security Operations Center (SOC). Download this whitepaper to gain insight on the state of threat management in SOCs.

eBooks

SC Media eBook on Encryption

With all the current talk about Apple, Safe Harbor and other encryption issues, this eBook will look at the state of encryption and how it has become as much a business issue as it is a security one.

SC Media eBook on Threat Intelligence

This eBook looks at how you can focus your threat intelligence feeds and tune your network hardware to provide the data you need.

SC Media eBook on Ransomware

Ransomware attacks are profitable and effective for the attackers. What's to stop them from continuing with these types of breaches? This ebook looks at why these attacks have become so popular in the past few years.

SC Media eBook on Internet of Things

IoT devices need not even be connected directly to the internet to become corporate vulnerabilities.

SC Media eBook on Security Analytics

It’s no longer a question of will you be breached but how quickly and effectively you respond to the breach. We discuss some of your options.

SC Media eBook on DDoS

Today’s attackers can corral millions of systems infected with malware to launch focused botnet attacks that can easily bring down targeted servers.

SC Media eBook on Insider Threat

Not all threats are malicious. Well-intentioned employees represent a risk vector just as severe as others.