Report

This report provides a summary of the OverWatch team’s threat hunting findings from the first half of 2020. It reviews intrusion trends during that time frame, provides insights into the current landscape of adversary tactics and delivers highlights of notable intrusions OverWatch identified.

Added: September 18, 2020
Webinar

NetBrain automation can reduce the time and manpower requirements by upwards of 90%, resulting in huge cost savings both in the initial audit preparation time and in post-audit activities. Watch the webinar to learn how NetBrain automation can help address CMMC requirements.

Added: September 10, 2020
Webinar

DLT and Coalfire have partnered to help examine the intricate certification levels and controls to the Department of Defense's CMMC compliance, with additional details of the impact in management of workloads in the cloud.

Added: September 08, 2020
Webinar

Federal contractors and subcontractors are being breached at alarming rates, resulting in the loss of sensitive data. To address this challenge, agencies like the Department of Defense are turning to new cybersecurity requirements for contractors, including the Cybersecurity Maturity Model Certification (CMMC).

Added: September 04, 2020
Webinar

​Federal contractors and subcontractors are being breached at alarming rates, resulting in the loss of sensitive data. To address this challenge, agencies like the Department of Defense are turning to new cybersecurity requirements for contractors, including the Cybersecurity Maturity Model Certification (CMMC).

Added: September 04, 2020
Whitepaper

The Cybersecurity Maturity Model Certification (CMMC) will soon be a requirement for any company doing business with the Department of Defense. Is your organization prepared?

Added: September 03, 2020
Webinar

The U.S. Department of Defense (DoD) is going to require public sector organization to meet the Cybersecurity Maturity Model Certification (CMMC) requirements to bid on contracts. During this webinar, Erinn Connor, federal systems integrator & sales enablement manage and Kyle Dimitt, senior compliance research engineer, at LogRhythm, discuss these new requirements to help your team prepare for certification.

Added: August 21, 2020
Infographic

Q4 is the last chance for federal civilian and defense agencies to spend their appropriated funds. Historically, in Q4, civilian agencies spend 34.8% and the U.S. Department of Defense spends 30.6% of their obligated yearly appropriations.

Added: August 20, 2020
Report

​In-Depth Analysis of the Top Cyber Threat Trends Over the Past Year, the 2020 Global Threat Report is one of the industry’s most highly anticipated reports on today’s most significant cyber threats and adversaries.

Added: August 18, 2020
Whitepaper

CIS released the CIS Amazon Web Services (AWS) Foundations Benchmark, intended for system and application administrators, security specialists, auditors, help desk, platform deployment, and/or DevOps personnel who plan to develop, deploy, assess, or secure solutions in Amazon Web Services.

Added: July 21, 2020
Solution Brief

The line between IT and Security is blurring. What was once a simple delineation between keeping information safe and providing the tools necessary to get work done is no longer clear. In this short paper, we’ll look at why asset management – once a pure IT play – matters for cybersecurity, and how both IT and security teams can benefit from cybersecurity asset management.

Added: July 21, 2020
Solution Brief

After working with hundreds of security professionals and covering over 1 million assets at some of the world’s most innovative brands, the team at Axonius has identified 5 things that security teams discover when they automate cybersecurity asset management. In this short paper, we’ll review each of these findings, discuss their security implications, and show how automating asset management can both find and resolve these challenges.

Added: July 21, 2020
Whitepaper

Eight years after former Forrester analyst John Kindervag introduced the Zero Trust model, the concept has hit the mainstream. As current Forrester analyst Chase Cunningham says, 85% of his calls involve zero trust. With the amount of interest in the concept, many organizations are rushing to understand how to implement the zero-trust model. In this guide, we’ll look at the first step to implementing zero trust: asset management.

Added: July 21, 2020
Whitepaper

Today, security professionals face many challenges in cybersecurity asset management, from aggregating disparate data sets to establishing real-time visibility in a fluid environment. Emerging technology, such as IoT deployments, and workplace modernization like BYOD continue to complicate this situation. Organizations must understand the depth and breadth of the devices on their network.

Added: July 21, 2020