There are many places to find backward-looking statistics of how many attacks were launched in cyberspace. Forward-looking guidance areas that security managers should focus...
Historically, security managers had the challenge of convincing C-Suite leaders and boards of directors of existing or potential threats. While those days are not necessarily...
This SANS Protects paper looks at current, prevalent threats to file storage solutions, how adversaries abuse them, and steps your organization can take to mitigate these...
The Evolution of Threat Hunting
For six years, SANS has conducted a Threat Hunting Survey to examine how cybersecurity professionals hunt inside their organizations to more...
This is SANS’ fifth year of conducting the Threat Hunting Survey to examine how the cybersecurity industry is currently supporting threat hunting and how they are conducting...
There is no shortage of media coverage of cybersecurity breaches and outages, and there are many places to find statistics about how many attacks were launched in cyberspace....
In this webcast, the second in a two-part series, we continue our examination of the Fidelis Elevate platform, with a specific focus on the Endpoint portion: Fidelis Endpoint.
Endpoint...
Given the wealth of artifacts that can be collected from endpoints, they are excellent resources for providing a comprehensive view into the activities of users and active...
Security teams cannot defend complex networks without holistic visibility and correlative insight into the environment. In this first part of a two-part review, SANS expert...
Lack of skilled staff, budget, and effective automation are the most commonly cited reasons for failing to achieve excellence in existing SOCs. To gain management support...