• DZone Guide To Application and Data Security, Volume II | Tech Library

    Get expert guidance to protect your applications and data from hackers Each year brings new security threats---and new tools and techniques to counter them.This comprehensive guide provides in-depth coverage of server, infrastructure and application security as well as the tools, systems and practices that can help you protect your organization.
  • Amazon May Let Developers Read Your Alexa Chats

    Amazon May Let Developers Read Your Alexa Chats

    The way to respond to competition is by improving the Echo/Alexa service.However, in order to do that Amazon is considering stepping into the risky area of sharing private data with third-party developers.
  • Verizon 3rd Party Vendor Exposes Millions of Customers' Data

    Verizon 3rd Party Vendor Exposes Millions of Customers' Data

    One of Verizon’s 3rd party vendors exposed millions of customers’ data last month, as first reported by ZDNet.” We’ve independently confirmed with Verizon that this is a wireline issue and that it does not directly involve wireless customers.
  • 360 Degree Visibility: Why Nothing Less Will Do for Risk and Security Teams | Tech Library

    360 Degree Visibility: Why Nothing Less Will Do for Risk and Security Teams | Tech Library

    Download Guidance Software pioneered the category of digital investigations, and our expertise in forensic security provides organizations with 360° Visibility across their entire enterprise and all stages of the Cyber Kill Chain.360° Visibility means true detection, complete response and reduced downtime for incident responders who are not willing to tolerate that 99% detection and prevention is an acceptable standard.
  • EnCase Endpoint Security: Security Begins at the Endpoint | Tech Library

    EnCase Endpoint Security: Security Begins at the Endpoint | Tech Library

    Download EnCase® Endpoint Security detects, validates and prioritizes unknown threats, assesses the scope and impact of a compromise, and returns devices to a trusted state.With EnCase Endpoint Security, you can:- Collect, aggregate and baseline all endpoint activity- Proactively address the gaps in your security framework- Detect unknown risks or threats even before data exfiltration has begun- Respond to any events for validation and triage- Perform manual or automated incident response with forensic-level investigation of endpoints- Automate the recovery of endpoints to a trusted state through remediation
  • 4 Key Takeaways from the 2017 SANS Incident Response Survey | Tech Library

    4 Key Takeaways from the 2017 SANS Incident Response Survey | Tech Library

    Download Guidance collaborated with the SANS Institute as a co-sponsor of their latest survey on Incident Response.This infographic contains highlights from the survey and how by leveraging Guidance Software's market-leading EDR solution, EnCase Endpoint Security, security teams can tackle the latest issues incident responders are facing.
  • What's New in EnCase Endpoint Security v6 | Tech Library

    Download Enterprises demand EDR products to offer scalability, strong detection and incident response workflows, and open integrations to operate more efficiently.EnCase Endpoint Security v6 was designed to not only meet these needs, but then exceed them with a beautifully redesigned front-end user interface.
  • Dark Reading INsecurity Conference Registration Now Open

    Dark Reading INsecurity Conference Registration Now Open

    This simple maxim is behind a new event that Dark Reading is rolling out: INsecurity, a live conference for the defenders of enterprise data security.It will be the "blue team" counterpart to the traditional "hacker con," and will concentrate on methods of defense, rather than exploits and attacks.
  • Dark Reading INsecurity Conference Registration Now Open

    Dark Reading INsecurity Conference Registration Now Open

    November event will focus on attendee interaction, "blue team" best practices.This simple maxim is behind a new event that Dark Reading is rolling out: INsecurity, a live conference for the defenders of enterprise data security.
  • Q1 Malware Review | Tech Library

    Download Between the beginning of 2017 and close of its first quarter, PhishMe Intelligence ™ completed analysis of 749 sets of phishing emails delivering nearly 10,000 unique malware samples supported by over 14,000 online resources.These indicators of compromise, as well as a full assessment of the phishing email tactics and malware capabilities, were profiled in in reports and Strategic Analysis documents designed to highlight techniques being used across the threat landscape.