Facebook iconTwitter icon
B2B-Network:
Whitepaper
Title
Client
Date
Dissecting a Cloud Attack: Securing Azure with AzLog

Just because data, applications, and systems exist in Azure doesn’t mean your commitment to security, ...
LogRhythm EMEA
2018-08-02
User and Entity Behaviour Analytics: Protecting your organisation from within

Organisations are built around technology, but that technology is still controlled and managed by huma...
LogRhythm EMEA
2018-08-02
Employing machine learning in a security environment: A data science-driven approach

No matter where you look in the security world today, you’ll see the terms machine learning and artifi...
LogRhythm EMEA
2018-08-02
CISOs Investigate: User Behavior Analytics

CISOs Investigate: User Behavior Analytics (UBA) includes interviews with 11 security leaders who have...
LogRhythm EMEA
2018-08-02
Managing User Risk: A Review of LogRhythm CloudAI for User and Entity Behavior Analytics

In this review, we explored the recently released LogRhythm CloudAI, which provides user-focused behav...
LogRhythm EMEA
2018-08-02
Market Guide for User and Entity Behavior Analytics

Security and risk management leaders considering UEBA will find that the market has fragmented, with a...
LogRhythm EMEA
2018-08-02
Networking and Information Systems (NIS) Directive

The EU’s Network and Information Systems (NIS) Directive entered into force in August 2016 with the ai...
LogRhythm EMEA
2018-08-02
Better Security. Fewer Resources.

When you consider the number of headlines that appear on a regular basis about major data breaches — d...
Cylance UK Ltd
2018-06-15
2017 Threat Report

Cylance® provides security solutions that are focused on protecting endpoints and servers from being c...
Cylance UK Ltd
2018-06-15
Loader