Case Study

One large healthcare organization, Driscoll Health System, sought to reduce its organizational risk to an acceptable level at an acceptable cost.

Added:
Data Sheet

This team makes extensive use of the CrowdStrike Falcon platform, delivering groundbreaking endpoint protection, enabling real-time incident response, and providing detailed forensic analysis and threat intelligence to ensure no threat goes undetected.

Added:
Case Study

The State of Wyoming Department of Enterprise Technology Services (ETS) needed to replace a legacy antivirus solution that was missing detections, impeding the ability of end users to do their jobs, and not providing crucial 24/7 protection. CrowdStrike® Falcon® was the answer.

Added:
Solution Brief

Election board members and state IT leaders need to protect the integrity of the voting process by stopping cyberattacks from interfering with election systems

Added:
Report

This report provides a summary of the OverWatch team’s threat hunting findings from the first half of 2020. It reviews intrusion trends during that time frame, provides insights into the current landscape of adversary tactics and delivers highlights of notable intrusions OverWatch identified.

Added:
Webinar

NetBrain automation can reduce the time and manpower requirements by upwards of 90%, resulting in huge cost savings both in the initial audit preparation time and in post-audit activities. Watch the webinar to learn how NetBrain automation can help address CMMC requirements.

Added:
Webinar

DLT and Coalfire have partnered to help examine the intricate certification levels and controls to the Department of Defense's CMMC compliance, with additional details of the impact in management of workloads in the cloud.

Added:
Webinar

Federal contractors and subcontractors are being breached at alarming rates, resulting in the loss of sensitive data. To address this challenge, agencies like the Department of Defense are turning to new cybersecurity requirements for contractors, including the Cybersecurity Maturity Model Certification (CMMC).

Added:
Webinar

​Federal contractors and subcontractors are being breached at alarming rates, resulting in the loss of sensitive data. To address this challenge, agencies like the Department of Defense are turning to new cybersecurity requirements for contractors, including the Cybersecurity Maturity Model Certification (CMMC).

Added:
Webinar

The U.S. Department of Defense (DoD) is going to require public sector organization to meet the Cybersecurity Maturity Model Certification (CMMC) requirements to bid on contracts. During this webinar, Erinn Connor, federal systems integrator & sales enablement manage and Kyle Dimitt, senior compliance research engineer, at LogRhythm, discuss these new requirements to help your team prepare for certification.

Added:
Infographic

Q4 is the last chance for federal civilian and defense agencies to spend their appropriated funds. Historically, in Q4, civilian agencies spend 34.8% and the U.S. Department of Defense spends 30.6% of their obligated yearly appropriations.

Added:
Report

​In-Depth Analysis of the Top Cyber Threat Trends Over the Past Year, the 2020 Global Threat Report is one of the industry’s most highly anticipated reports on today’s most significant cyber threats and adversaries.

Added:
Whitepaper

CIS released the CIS Amazon Web Services (AWS) Foundations Benchmark, intended for system and application administrators, security specialists, auditors, help desk, platform deployment, and/or DevOps personnel who plan to develop, deploy, assess, or secure solutions in Amazon Web Services.

Added:
Solution Brief

The line between IT and Security is blurring. What was once a simple delineation between keeping information safe and providing the tools necessary to get work done is no longer clear. In this short paper, we’ll look at why asset management – once a pure IT play – matters for cybersecurity, and how both IT and security teams can benefit from cybersecurity asset management.

Added: