ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Trustwave

  • ChatGPT: The Risks and Myths of Chatbot AIs

    From integration with customer service support to personal assistants and translation services, businesses like yours are already utilizing ChatGPT in an abundance of use cases. But there’s a dark side to this AI boom. Tune into this webcast to understand the risks and myths of ChatGPT in InfoSec.

  • It's Tuesday: Do You Know if You’re Compromised?

    To access insights from recent threat hunts conducted by Trustwave’s SpiderLabs, view this webcast.

  • 2023 Manufacturing Threat Landscape

    Recent findings show that the average data breach in the manufacturing sector costs $4.7 million. This webcast investigates the unique challenges involved in securing manufacturing operations, as well as key research findings and strategies that can be used to overcome these challenges. Watch to learn more.

  • 2023 Retail Threat Landscape

    $2.9 million: This is the average cost of a data breach in the retail industry. Retailers, are you prepared to pay that massive price? To help you avoid doing so, in this webcast a security expert from Trustwave SpiderLabs’ Threat Intelligence Team is here to equip you with the insights you need to defend against attacks. Tune in now.

  • ChatGPT Update: How AI Models are Changing the Face of Infosec

    How are AI models like ChatGPT transforming InfoSec? Find out in this webcast, which features insights from Senior Security Research Manager of Trustwave SpiderLabs’ Threat Intelligence Team, Karl Sigler.

  • Decrypting the Future: Trustwave’s 2024 Cybersecurity Predictions

    Between groundbreaking advances in AI, as well as ongoing geopolitical tensions, cyber threats are evolving rapidly with no end in sight. In this webcast, experts from Trustwave and SpiderLabs analyze how these circumstances have affected the threat landscape and formulate predictions for the future of cybersecurity. Read on to learn more.

  • 2023 Hospitality Sector Threat Landscape

    Because of the sheer amount of sensitive data that hospitality organizations maintain, a data breach can cause major reputational damage. This report delves into the hospitality industry’s unique cybersecurity threat profile. Read on to learn about boosting your company’s security stance.

  • Actionable Intelligence for an Active Threat Landscape

    In 2022, over 28.5 million healthcare records were breached, according to The U.S. Department of Health and Human Services. So, how can today’s healthcare organizations protect their records and defend against advanced threats? To unlock actionable insights, dig into this 46-page report.

  • Cybersecurity – Solutions and Services: Managed Security Services - SOC (Large Accounts

    Take a look through this “ISG Provider Lens Quadrant” report to learn about 27 MSSPs that can support the needs of large enterprises.

  • Cybersecurity – Solutions and Services: Managed Security Services - SOC (Midmarket)

    Review this “ISG Provider Lens Quadrant” report to compare the strengths, challenges and capabilities of 20 top MSSPs for midsize enterprises.

  • What MDR is and Why You Need It

    What is managed detection and response (MDR), and how can it benefit your organization’s security team? Unlock answers in this white paper.

  • Why a Zero Trust Architecture Must Include Database Security

    Browse this white paper to discover why and how to apply Zero Trust to your business’s database security.

  • For Improved Data Security, Burn, Baby, Burn

    Are you familiar with “back burning” and its security benefits? Review this white paper to learn how and why you should consider implementing the process in your organization.

  • IDC MarketScape: Worldwide Managed Cloud Security Services in the Multicloud Era 2022 Vendor Assessment

    To secure their workloads, many businesses are turning to managed cloud security services (MCSS) providers. The popularity of such services led IDC to analyze the market for MCSS. Dig into this report for a breakdown of one of the 18 providers evaluated: Trustwave.

  • 11 Questions to Ask Your Pentesting Service Provider

    To augment their security stances, many organizations have partnered with a penetration testing (pentesting) service provider. Is your business considering doing the same? Step in “11 Questions to Ask Your Pentesting Service Provider,” a white paper that can guide your market exploration. Read now to unlock insights.

  • Trustwave Managed Detection and Response Services

    For your business to succeed in a cyber landscape riddled with threats, you need to detect and respond to those threats rapidly. So, how can you do so? This overview explains how Trustwave Managed Detection and Response (MDR) can help. Continue reading to discover 5 benefits that Trustwave MDR can deliver for your organization.

  • Understanding Managed Security Services Provider Offerings

    Which offering from a Managed Security Services Provider (MSSP) does your business need? First, you have to understand your options. Dig into this brief guide to learn about and compare SIEM, Managed SIEM, SOC-as-a-Service and Co-managed SOC.

  • How Curtin University Partnered with Trustwave for Complete Cyber Insight and Response

    Curtin University of Western Australia knew that they needed to protect their more-than-57,000 students from phishing attacks and data breaches. This case study explores why they chose Trustwave as a partner to achieve this goal. Dig in to learn about the benefits that Trustwave’s MDR services delivered for Curtin.

  • Get Maximum Value from Your SIEM

    Your business must not only identify cyberattacks but also understand them. To supply organizations with the information that they need to do so, security information and event management (SIEM) systems have populated the cybersecurity scene. Learn about one such solution in this overview.

  • The Trustwave Difference: Your Trusted Partner in Cyber Security

    The duties of CISOs are seemingly endless. According to a report by Nominet Cyber Security, 48% of CISOs shared that the stress caused by the job has impacted their mental health. In an effort to alleviate some of that stress, Trustwave developed teams to serve as resources for CISOs. Explore this overview to learn more.

  • Rapid Time-to-Value: Trustwave Managed Services Onboarding

    When undergoing a digital transformation, a prolonged onboarding process can present security and efficiency challenges to organizations. That’s why Trustwave delivers security services onboarding in as little as 10 days. Read this white paper to understand Trustwave’s 5-phase strategy.

  • Frost Radar™: Global Managed Detection and Response Market, 2022

    With a shortage of cybersecurity experts in the workforce, many companies turn to managed detection and response (MDR) service providers to fill their needs. Learn all about the state of the MDR market, including top companies to consider and strategic insights in this analyst report.

  • 8Experts on Achieving Better Supply Chain Security

    According to Gartner, 89% of organizations have experienced a supply chain security risk event in the past 5 years. This white paper compiles the opinions of 8 industry-leading experts with the goal of providing insight into the difficulties faced when securing a supply chain, and what can be done to overcome them. Read on to learn more.

  • Get the Most Out of Your SIEM System

    SIEM platforms remove a huge burden from your security team and allow them to focus on other analysis-related tasks. However, SIEM systems are not infallible. Discover how to better employ your SIEM system to produce the most accurate event analysis you can hope for.

  • Global Security Report 2011

    In 2010, SpiderLabs performed more than 220 investigations worldwide. In 85% of the investigations, a system breach was confirmed. Of those entities in which a system breach was confirmed, 90% involved the actual theft of sensitive data, representing criminals’ effectiveness in extracting data once system access is obtained.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.