ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Kaspersky

  • How сan threat intelligence be tailored to your organization?

    Threat intelligence (TI) that isn’t tailored to your organization isn’t real intelligence. So, how can you get TI that’s right for you? Find out in this e-book, which outlines the differences between intelligence and data, when and where to use TI, how to maximize the benefits of TI for your organization, and more.

  • How Is This Happening To Us?

    You may not be aware of it, but your organization’s constantly evolving digital footprint can lead to a variety of security risks and vulnerabilities. So, take a moment to get a clearer picture of the potential threats resulting from your digital footprint – and what you can do to tackle them.

  • How is this happening to us?

    Dealing with phishing and scam URLs requires a thorough understanding of your footprint, through a combination of network reconnaissance, continuous dark web monitoring, and data leakages discovery. You can get all these capabilities and more with the Digital Footprint Intelligence service. Take a look now to learn more.

  • Threat hunting – what, why and how

    While many organizations utilize cybersecurity solutions like endpoint protection platforms (EPPs), around 10% of cyberthreats are capable of bypassing these defenses. Read this e-book to understand how threat hunting can level up your business’s security posture in the face of these threats.

  • Threat Intelligence: Maximizing The Benefits

    While the uses and benefits of TI are many and varied, so are its sources, to the extent that trying to identify what will work best for your particular organization can be a challenge in itself. So, how can you ensure TI delivers the maximum benefits to your enterprise? Download this whitepaper to learn more.

  • Is Your Use Of Threat Intelligence Up To Scratch?

    In under 10 minutes, Kaspersky’s easy online tool lets you assess your team’s capabilities against 15 key metrics like time to detect, triage and prioritizing incident response, and dealing with false positives - and get customized recommendations based on your responses. Check out this resource to learn more.

  • Kaspersky Digital Footprint Intelligence

    Dealing with phishing and scam URLs requires a thorough understanding of your footprint, through a combination of network reconnaissance, continuous dark web monitoring, and data leakages discovery. You can get all these capabilities and more with the Digital Footprint Intelligence service. Take a look now to learn more.

  • People, Processes, Technology: Building A Successful Security Operations Center

    Security Operations Centers (SOCs) are an increasingly popular way for organizations to secure themselves by centralizing personnel, tools and expertise. However, building or expanding an existing SOC involves overcoming many complex challenges. Download this white paper to learn how to solve these problems on your way to building the future SOC.

  • Threat Intelligence: The Basics

    Cyber incidents and business interruption exist as the top business risks worldwide, according to the Allianz Risk Barometer 2023. Threat intelligence is essential, this e-book argues, to defending against these risks. Keep reading to unlock a 15-page guide to threat intelligence.

  • Managed Cyber Protection in the Push for Cyber Resilience

    One way to boost cyber resilience at your organization, this IDC report explains, is by implementing multiple dimensions of protection. So, what are these dimensions, and what challenges can a multi-dimensional security approach present? Continue on to uncover answers.

  • Your way to XDR

    Security teams in organizations the world over are struggling with alert overload, disconnected tools, overwhelmed analysts, and so much more. But with an extended detection and response (XDR) solution, analysts can gain access to a single pane of glass with simple, fast automation tools. Learn more about XDR in this infographic.

  • The innovative potential of XDR

    Extended detection and response (XDR) is the hottest tech on the block, with Forrester stating that differentiated XDR “will supersede endpoint detection and response (EDR) in the short term and usurp SIEM in the long run.” Download this white paper for an intro to XDR and access 5 key things to consider when comparing XDR vendors and solutions.

  • Cyber Resilience The Cornerstone of a Successful Cyber Defense Strategy

    Disparate security tool sets and a scarcity of skilled staff, compounded with a digital revolution, are exposing enterprise security gaps and contributing to a spike in cybercrime. Download this IDC eBook to learn how digital leaders are

  • The Cornerstone of a Successful Cyber Defense Strategy

    Disparate security tool sets and a scarcity of skilled staff, compounded with a digital revolution, are exposing enterprise security gaps and contributing to a spike in cybercrime. Download this IDC eBook to learn how digital leaders are

  • Incident Response

    A strong, mature cybersecurity posture can help organizations recover from incidents quickly, minimize downtime, contain costs, reduce risks and protect market share; but expertise is needed to get there. Explore new perspectives and best practices on incident response with data-informed research and insights in this report.

  • People, Processes, Technology: Building A Successful Security Operations Center

    Security Operations Centers (SOCs) are an increasingly popular way for organizations to secure themselves by centralizing personnel, tools and expertise. However, building or expanding an existing SOC involves overcoming many complex challenges. Download this white paper to learn how to solve these problems on your way to building the future SOC.

  • Managed Detection and Response

    As cybercrime continues to evolve and grow as fast as any other technology in the marketplace, IT leaders must be prepared with the MDR knowledge and information they need to outmaneuver the fraud actors out there looking to wreak havoc with your systems. To do this, you need to know their methods, activities, and tactics. Read on to learn how.

  • Incident Response

    A strong, mature cybersecurity posture can help organizations recover from incidents quickly, minimize downtime, contain costs, reduce risks, and protect market share; but expertise is needed to get there. Explore new perspectives and best practices on incident response with data-informed research and insights in this analyst report.

  • SOC Modernization And The Role Of XDR

    In order to understand the drivers of and the technologies supporting SOC modernization, ESG surveyed 376 IT and cybersecurity professionals, resulting in this report, “SOC Modernization and the Role of XDR.” Keep reading to explore the findings.

  • Why Are Targeted Ransomware Attacks So Successful?

    The ransomware game has changed, and with today’s high-profile and complex attacks always evolving, it’s critical for organizations to keep up. So, what are the best ways to do this? Access this white paper to learn more.

  • Threat Intelligence: maximizing the benefits

    When your organization is vulnerable to advanced persistent cyberthreats, leveraging threat intelligence (TI) can prove beneficial to you. “But there are so many TI products on the market,” you may be thinking. “Where does one begin?” Begin by unlocking 4 key TI considerations in this data sheet.

  • Threat Intelligence: what, when and how

    So, your organization has vast amounts of threat data. That’s great…if you know what to do with it. To translate your threat data into business value, consider leveraging threat intelligence (TI). Learn about the what, when and how of TI in this white paper.

  • What kind of threat intelligence does your organization need?

    Your organization has unique cybersecurity needs, and Kaspersky aims to meet them. With Kaspersky, you can achieve threat intelligence that’s tailored to your organization’s systems and processes. Check out this infographic to discover 6 reasons why you should consider adopting Kaspersky Threat Intelligence.

  • Kaspersky Security Awareness

    The statistic should not surprise you. More than 80% of all cyber-incidents are caused by human error. Therefore, organizations need to focus on the concept of cybersafety. A culture rooted in cybersafe behaviors will reduce the number of incidents you must face. Read on to learn about a learning solution that helps you get there.

  • Threat hunting – what, why and how

    Take a look through this e-book for an introduction to modern threat hunting tools, and learn how a proactive, pre-emptive approach to threat management can help minimize harm and strengthen future security controls.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2023 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.