Top White Papers and Webcasts

  • Attacks have many phases. Before launching, the attacker needs to stage Internet infrastructure to support each phase. Two early phases are to redirect or link to a malicious web domain or send a malicious email attachment. Attacks that target organizations often leverage email attachments or direct payload downloads. Yet attacks with an objective to exfiltrate data, still must initiate a command-and-control callback. This solution brief discusses a security solution that can block both initial exploit and …

  • What new and continuing threats are responders uncovering in investigations, and how are they dealing with those threats? This on-demand webcast releases results from the SANS 2018 Incident Response Survey that examines how incident response (IR) teams are coping with organizational structures, resources, and IR implementation in an ever-changing threat environment. Watch this webcast to learn how organizations have structured their incident response functions, what systems they are conducting investigations …