Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Research Library

The top resource for free research, white papers, reports, case studies, magazines, and eBooks.

Share Your Content with Us
on TradePub.com for readers like you. LEARN MORE
The Inner Workings of Cyber Defenders

Request Your Free Report Now:

"The Inner Workings of Cyber Defenders"

Real-life examples of how defenders collaborate to mitigate key threats.

You’ve probably encountered a wave of threat intelligence reports outlining attack campaigns in 2020. Although these reports are helpful, many don’t show you how different teams should work together to detect, respond and mitigate the attacks that threaten their businesses.

We've created a new type of report we break down:

  • Real examples of how individual teams collaborated from L1 and L2 analysts, to DFIR, Threat Intelligence, and Security Engineers etc.
  • The steps these teams took to effectively detect and respond to some of the most persistent threats
  • The techniques used by attackers throughout the incident lifecycle
  • Key recommendations for SOC teams to more collaboratively and effectively respond to threats


Offered Free by: CyberProof
See All Resources from: CyberProof

Recommended for Professionals Like You: