Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like physical security and data protection.

Filter the library by ...
CLEAR

The World’s Most Advanced Transactional AI Company

The Retail Banking Industry’s Preferred Choice for Real-Time Risk Management And Financial Fraud Detection. Our proprietary AI system gives banking institutions the ability to identify fraud and measure risk in real-time across all channels, in an easy to use visual dashboard.

Video/Webcast | Presented by McAfee

MITRE ATT&CK as a Framework for Cloud Threat Investigation

In collaboration with UC Berkeley’s Center for Long Term Cybersecurity, we conducted research to uncover the current use of MITRE ATT&CK in a cloud context.

Case Study | Presented by Chronicle

Case Study: Global healthcare industry leader

A US based healthcare sector market leader was contending with constantly growing security telemetry volumes. Over the years, growth of infrastructure and new security tools had significantly expanded the aggregate log volume their SOC needed to access for investigations.

Case Study | Presented by Chronicle

Chronicle Case Study: Aspen Skiing Company

After evaluating various existing and emerging technologies in the security analytics space, the ASC team selected the Chronicle Security Analytics Platform (part of Google Cloud) for its distinct advantages in addressing their specific needs.

Case Study | Presented by Chronicle

Chronicle Case Study: Quanta Services

In this case study, James Stinson, VP of Information Technology for Quanta, discusses the company’s experience with Chronicle’s security analytics platform.

White Paper | Presented by Chronicle

Deloitte + Google Cloud: Future of the SOC

This white paper, written jointly by Deloitte and Google Cloud, defines the key factors that are shaping the modern Security Operations Centre and the challenges SOCs must overcome.

White Paper | Presented by Chronicle

Deloitte + Google Cloud: Future of the SOC Part 2

The second article of the “Future of the Security Operations Center (SOC)” series discusses what is arguably the most important component of a SOC—its people. Geared towards cyber security practitioners, including those who are just beginning their journey in security operations, as well as SOC leaders who are wrestling with finding the desired balance between outsourcing and insourcing their operations, this article conceptualizes the problems and reimagines solutions for the people side of your SOC.

White Paper | Presented by Chronicle

ESG: Analyzing the Economic Benefits of Google Chronicle Security Analytics Platform

Never before has it been so critical for security teams to effectively secure the infrastructure for an increasingly remote workforce while they themselves may have limited physical access to on-premises resources. Those organizations that can deploy their security analytics and operations in the cloud are in a better position to continue to provide a secure infrastructure to the business.

Video/Webcast | Presented by McAfee

Is Team Safe? Top 10 Security Threats Explained

Learn about the top ten threats from Microsoft Teams, decide your policies for Teams use and how to enforce them.

White Paper | Presented by McAfee

Microsoft Teams: Top 10 Security Threats

In this paper, McAfee discusses the top threats resulting from Teams use along with recommended actions.

Load More