Whitepaper

Malware and infected bots are used for everything from stealing passwords to launching some of the most disruptive network-based attacks in history. Since their discovery in the 1990s, malware-infected computing resources known as bots have plagued network connected resources.

Added: October 04, 2022
Whitepaper

Adversaries constantly innovate and explore new and more powerful DDoS attack vectors, evidenced by the creation of new ones every year. As DDoS defenses become more precise and effective, attackers continue to find ways to bypass those defenses with new DDoS attack vectors and methodology.

Added: October 04, 2022
Whitepaper

Read excerpts from a webcam interview recorded by Todd Danielson, the editorial director of Informed Infrastructure.

Added: September 21, 2022
Whitepaper

Read how Highly Evasive Adaptive Threats (HEAT) sidestep cyber defenses.

Added: September 19, 2022
Whitepaper

97% of federal executives report the COVID-19 pandemic created an unprecedented stress test for their organizations, with the number one ranked stressor to their organization being their technology architecture.

Added: September 13, 2022
Whitepaper

In this paper, we take a look at the state of the cyber insurance industry and offer up nine key tenets organizations should follow to establish a cybersecurity enhancement program to reduce their risk and make themselves insurable.

Added: September 07, 2022
Whitepaper

General counsel and legal departments in higher education play an essential role in protecting their institutions valuable information and strengthening security efforts against cyber-attacks.

Added: August 24, 2022
Whitepaper

A Comprehensive Open Solution in a Crowded and Confusing Space.

Added: August 12, 2022
Whitepaper

Integrating SIEM and Network Detection and Response into a Common SOAPA/XDR Architecture.

Added: August 12, 2022
Whitepaper

As agencies pursue mission goals, employee and stakeholder capabilities are paramount. Agencies have a long-standing discipline of talent and performance management, and ensuring their single largest asset – people – are skilled and supported to be successful.

Added: July 28, 2022
Whitepaper

Learn how savvy leaders will view their security strategy in a newly holistic way

Added: July 01, 2022
Whitepaper

Relying on upstream Kubernetes isn't enough for teams deploying Kubernetes into production. Basic Kubernetes installations are plagued by a lack of central visibility, inconsistent security practices, and complex management processes.

Added: June 21, 2022
Whitepaper

Check out IBM's new X-Force Threat Intelligence Research Hub: Access the latest research and reports highlighting threat intelligence, cyber security, and improving incident response.

Added: June 20, 2022
Whitepaper

Explore the tenets of data-led migration and best practices for putting it to work.

Added: June 10, 2022
Whitepaper

There are a wide variety of mass notification service (MNS) providers out there, many of them claiming to be the best, or able to do everything you need. To inform your purchase decision, it is critical to do your due diligence when selecting a service that will be used during urgent and emergency situations. Blackboard's Buyer’s Guide is intended to help you to ask the right questions about prospective MNS vendors to ensure you select the provider that is best for you and your community.

Added: June 07, 2022