nDiscovery Resources

Ransomware Survivial Guide


Get tips to prepare your organisation to defend against, confidently respond to, and survive a ransomware attack.


Log Analysis Guide


Log analysis is the key to reliable and consistent cyber threat detection. Learn why it matters, what it can tell you, and how to do it in the informative guide. DOWNLOAD NOW

Cyber Threat Hunting Guide


Take a proactive approach to protecting your environment from cyberattacks with Cyber Threat Hunting. Learn how in this informative guide.


Ransomware Incident Response Checklist


Is your organisation prepared for a ransomware attack? Here's help! Download our Ransomware Incident Response Checklist for the key steps you need for preparation, analysis, mitigation, and debriefing!


Cybersecurity Program Template


An effective Information Security / Cybersecurity Program starts with strategic planning and sustainable policies.  Use the nDiscovery Sample Cybersecurity Program as a starting point for your program or as a reference to enhance your existing program!


Read our most popular blog posts!

Cybersecurity and the Insider Threat

Organizations are vulnerable to inside attacks. To effectively protect against insider threats, they must first understand what they are. Here's a closer look.   Read More

6 Steps to a Cybersecurity Risk Assessment

Cybersecurity risk assessment is an essential part of business today. Here are 6 steps to help you calculate a risk rating for your critical business systems.  Read More

An Introduction to Cyber Threat Hunting

Using cyber threat hunting can make your organization more secure. Here are some benefits and challenges of proactively hunting threats on your network.  Read More

Get Started