Facebook iconTwitter icon
B2B-Network:
Whitepaper
Title
Client
Date
Automate DevOps/SecOps deployment with CI/CD pipeline integrations

By focusing on frequent code integration, automated testing, and keeping the mainline code version in...
F5 Networks
2019-10-10
Using MITRE ATT&CK™ in Threat Hunting  and Detection

MITRE ATT&CK1 is an open framework and knowledge base of adversary tactics and techniques based on rea...
LogRhythm EMEA
2019-10-09
The Security Operations Maturity Model: Quick Reference Guide

Organisations should think of security operations as a critical business process. Effective security o...
LogRhythm EMEA
2019-10-09
LogRhythm for SWIFT Customer Security Controls Framework

Society for Worldwide Interbank Financial Telecommunication (SWIFT) facilitates a huge number of finan...
LogRhythm EMEA
2019-10-09
Security Operations Maturity Model

This white paper explores how to assess and evolve the principle programmes of the security operations...
LogRhythm EMEA
2019-10-09
Defeating threats through user data: Applying UEBA to protect your environment

You’re facing a constant barrage of threats, some of which you don’t even know exist. The reality is t...
LogRhythm EMEA
2019-10-09
Budgeting for a modern SIEM: A guide to managing financial risk

For CEOs, growth is a welcome challenge — it’s an indicator that business is healthy. But growth also ...
LogRhythm EMEA
2019-10-09
Definitive guide to SOAR

Cybersecurity organizations have their work cut out for them. As the last line of defense in the fight...
LogRhythm EMEA
2019-10-09
Protect and Optimize Containerized Apps

Container platforms such as Kubernetes and RedHat OpenShift combine with agile development methodologi...
F5 Networks
2019-08-30
Loader