Top White Papers and Webcasts

  • The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new security tool is released, threat actors strive to develop a way around it.  One advanced threat technique that is experiencing success is the use of fileless attacks, where no executable file is written to disk.     The 2017 Verizon Data Breach Investigations Report found that 51 percent of cyberattacks are malware-free, so there’s no indication that these attacks …

  • More business applications, including advanced analytics, are moving to cloud-based platforms. Advantages include agility, innovation and a cost-effective way to gain high performance. But many cloud migrations fail to gain all these potential benefits.   In this paper, SAS and the International Institute for Analytics (IIA) explore how to maximize the performance and value of analytics in the cloud, weigh the options, and choose the right approach to migration.