SANS 2020 Threat Hunting Survey
This is SANS’ fifth year of conducting the Threat Hunting Survey to examine how the cybersecurity industry is currently supporting threat hunting and how they are conducting threat hunting in …
This is SANS’ fifth year of conducting the Threat Hunting Survey to examine how the cybersecurity industry is currently supporting threat hunting and how they are conducting threat hunting in …
There is no shortage of media coverage of cybersecurity breaches and outages, and there are many places to find statistics about how many attacks were launched in cyberspace. What is …
In this webcast, the second in a two-part series, we continue our examination of the Fidelis Elevate platform, with a specific focus on the Endpoint portion: Fidelis Endpoint. Endpoint provides …
Given the wealth of artifacts that can be collected from endpoints, they are excellent resources for providing a comprehensive view into the activities of users and active attackers – and …
Security teams cannot defend complex networks without holistic visibility and correlative insight into the environment. In this first part of a two-part review, SANS expert Matt Bromiley evaluates the Fidelis …
Lack of skilled staff, budget, and effective automation are the most commonly cited reasons for failing to achieve excellence in existing SOCs. To gain management support for resources, SOC managers …
The SANS 2015 survey of the incident response capabilities of more than 500 security professionals found good news and bad news. The good news is that reported malware incidents, breaches, …