Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Big Data, Cloud and Mobile.

Filter the library by ...

White Paper | Presented by ReliaQuest

Continuous Attack Simulations

How to Identify Risk, Close Gaps, and Validate Your Security Controls.

White Paper | Presented by ReliaQuest

The CISO’s Guide to Metrics that Matter in 2020

How can security metrics be applied to both strengthen your security program and communicate the value of this program to leadership?

White Paper | Presented by ReliaQuest

Rethinking Security Automation: Six Best Practices to Improve Visibility & Accelerate Response

The problem today is that there are too many tools, too little integration among them, and more noise than a team can analyze and understand – all of which add up to less visibility into threats and less efficient security teams. Automation is supposed to solve the “tool fatigue” problem, surfacing the most critical issues by running playbooks against common threats and freeing up valuable resources for other tasks. However, expectations for automation have outpaced its capabilities to drastically reduce human intervention in security monitoring.

White Paper | Presented by ReliaQuest

451 Research Report: Tackling the Visibility Gap in Information Security

451 Research recently published insights gathered from in-depth interviews with security leaders across 150 large enterprises to better understand the most critical challenges facing their teams.

White Paper | Presented by ReliaQuest

Top 5 Log Sources You Should Be Ingesting but Probably Aren’t

The key to minimizing security threats and maximizing business insights is logging and monitoring all relevant events from across and enterprise IT environment — but some data sources present unique logging challenges, often leaving them unmonitored and vulnerable to attack.

White Paper | Presented by ReliaQuest

Three Steps to Securing Enterprise Data on Cloud Platforms

Assuming security of data stored on Amazon Web Services (AWS), Microsoft Azure and Google Cloud Platform (GCP) is dangerous and potentially costly. The truth is, these cloud platforms offer excellent security options, but require proper configuration and monitoring to ensure consistent security.