This special report provides a detailed Homeland Security Week summary, quotes and statistics from the high profile DHS speakers at the conference and key themes across their presentations. The report covers topics including The Changing Threat Landscape, Driving Solutions into the Field, Navigating the Data Stream and Partnering with the Private Sector.
Instability in Ukraine, Japan's efforts to revitalize its defense, continued military buildups in China, and U.S. debates over post-war defense spending and force posture -- what drove these shifts and did nations respond? The evolving global economy, combined with changing security threats facing the largest defense spenders, is driving revisions in defense planning and spending. Adaptation, collaboration, and investment have emerged as the top priority defense management strategies at mid-decade. Read more in this whitepaper, courtesy of Deloitte.
In the nearly 15 years since the September 11, 2001 terrorist attacks, the global security community’s focus on preventing similar attacks has been unrelenting. Indeed, the United States has been free of large-scale terrorism since 2001 due in large part to these efforts. Despite this success, public discourse related to domestic and international terrorism is largely focused on the movement of individuals. While this emphasis is unsurprising, it must not result in an overly prescribed view of the terrorist threat landscape.
Novetta Entity Analytics combines data from multiple sources and produces advanced 360-degree views of real-world entities and their relationships to other records and entities. This white paper provides technical readers with a walkthrough of the processes Novetta Entity Analytics uses to combine data from multiple sources and rapidly resolve and publish information about real-world entities contained within that data. Download to learn more
Novetta Cyber Analytics is an advanced network-traffic analytics solution that empowers analysts with comprehensive, near real-time cyber security visibility and awareness, filling a critical gap in today’s enterprise cyber security toolset. With queries that take only seconds ‒– even at Petabyte network traffic scale ‒– the solution enables analysts to receive comprehensive answers to complex questions “at the speed of thought,” then instantly access the ground truth network traffic needed for alert triage, incident response and hunting. Find out more about it here