What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Download Now

: Asset

File Type: .pdf


 

Related Items: To download additional items, select those you are interested in and click the submit button at the bottom of the page. You will be able to download the current item and any additional items you select.

The Awakening of Cyber Threat Analysis: An Intelligence-Driven Solution to Security and Risk : Whitepaper

i2 Enterprise Insight Analysis helps the analyst see the forest through the trees. Analysts’ using i2 EIA will discover that these events are all related. All the anomalies are connected to DHCP servers initially infected by malware.


4 Strategies for Securing Federal Applications at the Speed of DevOps: Whitepaper

Federal agencies want to move faster through the use of DevOps and open source software. Teams developing applications at a furious pace don’t want to be encumbered by bolt-on security procedures. Agencies need security protocols that can keep pace with development practices without holding them back.


Quantifying the Risk of a Data Breach: Top Six Industries: Whitepaper

Aberdeen Group's Computer Intelligence Technology Data Set analyzes the risk of a single data breach and provide insight about the risk of a data breach across a broader installed base and makes it easier to demonstrate a business case for investments in technical controls, such as data encryption.