Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Big Data, Cloud and Mobile.

Filter the library by ...
CLEAR

Video/Webcast | Presented by Lastline Inc

A Better Approach to Reduce False Positives

Even after implementing SOAR, SIEM, IDPS and other technologies to improve security insights, companies still spend thousands of hours triaging alerts that are mostly false positives.

White Paper | Presented by NowSecure

A Manager's Guide to the OWASP Mobile Security Project

This reference guide frames the challenge of securing an ever-growing mobile app portfolio with finite resources.

eBook | Presented by Lastline Inc

A Day in the Life of a SOC Analyst

SOC analysts like James are wondering how we got to the state of overzealous alerting? Is the detection-based approach the root cause?

White Paper | Presented by Lastline Inc

False Positives: The Cure is Worse Than the Disease

This paper discusses the causes of the continued growth of false positives and the risky practices SOC teams employ to try to keep their head above water.

Geotechnical Contractor Eliminates Silos and Bolsters Security

A global geotechnical solutions provider was challenged by a complex, siloed IT environment that was hard to manage and secure. Find out how Insight helped them assess their situation, plan, and execute a deployment of multiple security solutions available within Microsoft 365.

Mastering Email Security

This whitepaper provides valuable information for any IT manager regarding the key scenarios, risks, and threats inherent with every email system.

Secure the User Ecosystem

This infographic explores cybersecurity trends, security strategies, and how Microsoft 365 can help.

Cisco Umbrella Has Your Cloud Apps Covered

Read this feature brief to learn how Cisco Umbrella delivers a secure cloud-based app experience to ensure that your users’ apps and data are secure — no matter where they work.

White Paper | Presented by Panda Security

Avoiding APTs: Defending Your Critical Infrastructure

Today’s cybersecurity landscape is constantly evolving, with new attacks surfacing regularly, and known attacks growing in both scope and complexity. From ransomware to cryptojacking and beyond, hackers are continuously finding access with new tactics. One area that has seen a lot of growth recently is Advanced Persistent Threats (APTs).

White Paper | Presented by Panda Security

Cyber-Security Compliance: Guide to Data Protection Regulatory Compliance

Over the last few years, new governmental, and sometimes industry-specific regulations and acts have been passed aimed at ensuring that companies and organizations store and process customers’ personal and sensitive data in an appropriate and lawful manner.

Load More