Resource Library

Network World has assembled a comprehensive reference collection of technical resources to help guide your decision making.

Filter the library by ...

Maximize the ROI of Detection & Response

Advanced attackers can evade detection and stay under the radar by stealing credentials and masquerading as legitimate users. In response, security teams today must deploy multiple – often siloed – detection and response tools.

The Forrester MITRE ATT&CK Evaluation Guide

MITRE ATT&CK™ is a knowledge base of adversary tactics and techniques based on real-world events. Its open framework lets organizations access extremely detailed information on attack tactics across 12 categories, pinpointing how these tactics have been used and how to stop them.

eBook | Presented by Palo Alto Networks

Elements of Security Operations

Elements of Security Operations dives into best practices on how to build a better SOC. Learn step by step how to make your security operations more effective, consistent and poised to tackle future threats.

How to pick a winner in EDR

As your enterprise faces more frequent targeted attacks, you need a more effective approach to detect malicious activity, inform your threat hunting and understand attacker behavior.

IDC Report: Key Requirements for EDR

Effective cybersecurity is critical to the success of digital transformation efforts. Unfortunately, many companies have vulnerable endpoints, leaving easy entry and exit points for attackers. Get insight into how to secure the endpoint and beyond.

XDR: Enterprise-Scale Detection and Response

XDR replaces legacy siloed tools to provide visibility and analytics across your entire infrastructure. See how XDR supercharges detection, investigation and response capabilities to solve security operations challenges.

Threat Hunting 101

Read this white paper to get an overview what you need to start a threat hunting practice and how to go about it.

Open and Dark Web Research: Tips and Techniques

Research Toolbox provides a rich set of capabilities allowing financial fraud investigators, cyber threat intelligence, and OSINT analysts to safely and anonymously research the web without negatively impacting the host or source network.

eBook | Presented by Lastline Inc

A Day in the Life of a SOC Analyst

The combination of Security Information and Event Management (SIEM) and Endpoint Detection and Response (EDR) provides better security, but it’s still missing a key component to understand broad business context and how different devices and users interact in your environment.

A Practical Approach to Enterprise Identity Management

This document introduces a more balanced strategy for large-scale administration of identities and access rights.

Load More