SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Operations
Vulnerability Management: What You Need to Know to Prioritize Risk
Leveraging Open Source Security Tools: The Essential Guide
Attackers Move Stealthily Around Networks - And How To Detect Them
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done
How to Use Crowd-Sourced Threat Intelligence to Stop Malware in its Tracks
How to Simplify Audit Compliance with Unified Security Management
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
Best Practices for Leveraging Security Threat Intelligence
How to Detect System Compromise & Data Exfiltration
Crowd-Sourced Threat Intelligence
Security Operations Center (SOC) Essentials for the SME
The One-Man SOC: Habits of Highly Effective Security Practitioners
Cover your Assets: How to Limit the Risk of Attack on your XP Assets
Reduce the Attacker's ROI with Collaborative Threat Intelligence
Beginner's Guide to SIEM
OSSIM User Training: Get Improved Security Visibility with OSSIM
Customer Training: Get Improved Security Visibility with USM v4.6
Battling Savvy Cyber Thieves - SCMagazine