ITReport Building a high-performance data and AI organization Every organization today recognizes the strategic value of generating actionable insights from their enterprise data. That’s why data...
Archive - December 2023
Personalize your customer journey
ITReport Personalize your customer journey Save hours with Databricks Solution Accelerators How to personalize at scale in financial services Personalizing your customer experience doesn’t have to...
Preventing fraud with Data + AI
ITReport Preventing fraud with Data + AI A primer for modern threats Fraud is a costly and growing problem. For every $1 of fraud, companies pay 3.36x in chargebacks and replacement and operational...
MITRE Engenuity™ ATT&CK® Evaluation
MITRE Engenuity™ ATT&CK® Evaluation For past three years, MITRE Engenuity has independently evaluated cybersecurity products, helping industry and government institutions make informed decisions to combat security...
Six Steps to Successful and Efficient Threat Hunting
Six Steps to Successful and Efficient Threat Hunting Cysecurity is a constant cat-and-mouse game. Adversaries always find new tactics, even as our defenses improve. According to Verizon DBIR, advanced threats often go...
SentinelOne Singularity™ Platform – Packages, Modules, and Services
SentinelOne Singularity™ Platform – Packages, Modules, and Services The SentinelOne Singularity Platform empowers SOC & IT Operations Teams with a more efficient way to protect information assets against...
Untangling the Cybersecurity Alphabet Soup From EDR, SIEM, and SOAR to XDR
Untangling the Cybersecurity Alphabet Soup From EDR, SIEM, and SOAR to XDR The cybersecurity industry is awash with jargon, abbreviations, and acronyms. As sophisticated attack vectors multiply, from endpoints to...
How CISOs Empower Enterprises to Develop Robust Identity Security Programs
How CISOs Empower Enterprises to Develop Robust Identity Security Programs According to recent security research, stolen credentials caused nearly 50% of all attacks, and credential attacks have increased by 30% since...
Preventing In-Network Lateral Movement Attacks with Identity Security
Preventing In-Network Lateral Movement Attacks with Identity Security Attackers have proven they can evade the perimeter to establish a beachhead inside a network from which they can laterally move while remaining...
FrostRadar™: Extended Detection and Response, 2023
FrostRadar™: Extended Detection and Response, 2023 As a first look into the competitive environment, it is essential to understand the three approaches to XDR: open (focused on third-party integrations and open...

