Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like physical security and data protection.

Filter the library by ...
CLEAR

White Paper | Presented by Expanse

5 Common Perimeter Exposures and What You Can Do About Them

When a system is left open on the public Internet, it’s only a matter of time before a bad actor finds it. In less than an hour, an attacker can have a list of every single exposed system of a given type in the world.

White Paper | Presented by Carbon Black

A Buyer’s Guide to SecOps

The recent emergence of real-time solutions are enabling Security and IT Operations teams to work together to speed up analysis and response times to reduce risk in their organizations.

White Paper | Presented by Expanse

Identifying and Managing Strategic Supplier Risk

Your organization is only as secure as your least secure supplier. You must continuously monitor your suppliers’ security posture and have a shared governance model for operationalizing policies to remove blind spots on your suppliers’ networks that could expose your organization to business disruption or a breach.

White Paper | Presented by Panda Security

The Nightmare of Cyber Extortion

How to Prevent Cyber Extortion

White Paper | Presented by Expanse

Your New Attack Surface: Discover, Track, and Manage the Assets That Attackers Target

While tracking your online brand presence is important, monitoring your Internet attack surface and prioritizing activities that reduce the number of internet-exposed attack vectors is the most important thing you can do to protect your organization.

Beginner’s Guide to Open Source Intrusion Detection Tools

This white paper provides an overview of Open Source IDS and the various IDS tools available today. Whether you need to monitor hosts or the networks connecting them to identify the latest threats, these are some of the best open source intrusion detection (IDS) tools available to you.

Insider’s Guide to Incident response

AT&T and AlienVault have joined forces to create AT&T Cybersecurity, with a vision to provide phenomenal threat intelligence, collaborative defense, and effective security for organizations of all sizes. The fight to protect your company’s data isn’t for the faint of heart. And when it comes to the worst-case scenario, you’ll need all the help you can get. That’s why we’ve developed the Insider’s Guide to Incident Response. It will give you an insider’s perspective on how to build an incident response plan and develop a team armed with the right tools and training to combat serious threats to your network.

eBook | Presented by AT&T Cybersecurity

How to Build a Security Operations Center (on a Budget)

AT&T and AlienVault have joined forces to create AT&T Cybersecurity, with a vision to provide phenomenal threat intelligence, collaborative defense, and effective security for organizations of all sizes. Download this eBook today to learn how to build a SOC without requiring costly implementation services or large teams to manage it.

eBook | Presented by AT&T Cybersecurity

Beginners Guide to SIEM

AT&T and AlienVault have joined forces to create AT&T Cybersecurity, with a vision to provide phenomenal threat intelligence, collaborative defense, and effective security for organizations of all sizes. Our security gurus will explain what SIEM is (and isn’t) and how to get up and running with it quickly and painlessly.

Open Source Network Security Tools for Beginners

AT&T and AlienVault have joined forces to create AT&T Cybersecurity, with a vision to provide phenomenal threat intelligence, collaborative defense, and effective security for organizations of all sizes. In this white paper, we'll provide an overview of some of our favorite open source tools as well as tips on how to use them for network security.

Load More