ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Kaspersky

  • Common TTPs of the Modern Ransomware Groups

    Recent survey data shows that 66% of IT decision makers are highly concerned by potential ransomware attacks. In this webcast, 5 experts from Kaspersky sit down to discuss the state of ransomware, paying specific attention to the tactics, techniques, and procedures (TTPs) of ransomware syndicates. Watch now to learn more.

  • What is Ransomware, How it Works and What You Can Do to Stay Protected

    Ransomware is a serious threat that can affect you and all computer and mobile device users. But by knowing how to avoid it and by using up-to-date security software, you can stay safe. Watch this video to learn how ransomware works and what you can do to stay protected.

  • Kaspersky Expert Security Marketing TI Video

    As the threat landscape continues to evolve, many businesses are turning to tools to help boost their defenses. One such tool is Kaspersky Threat Intelligence. Watch this video to understand how Kaspersky Threat Intelligence can leverage its 3-pronged approach to help you detect threats and mitigate damage.

  • No Stone Unturned

    Cryptors of all types present a major advance in the threat posed by cybercriminals. While stolen data is a serious problem, encrypted and inaccessible hostage data is even worse. Read on now to learn more about the danger of cryptors, as well as how Kaspersky Ransomware Protection can help you overcome them.

  • Kaspersky Expert Security Marketing TI DFI Video

    To help businesses protect against increasing threats, Kaspersky developed Kaspersky Digital Footprint Intelligence. How does the tool work? It monitors the surface web and the dark web for discussion of your business and analyzes your system’s security strengths and weaknesses. Watch this video to learn more.

  • Kaspersky Expert Security Marketing TI Threat Analysis Video

    How can you quickly analyze and attribute the complex cyberattacks threatening your organization? Consider adopting Kaspersky Threat Analysis, which leverages its Cloud Sandbox technology and Cloud Threat Attribution Engine to protect businesses from the evolving threat landscape. Watch this video to learn more.

  • Why do we need threat intelligence platforms and how to select them?

    Many businesses leverage threat intelligence platforms to strengthen their detection and response measures. But what sets one threat intelligence platform apart from the rest? #1: Speedy data importation and exportation. Review this data sheet to discover 3 more features.

  • How сan threat intelligence be tailored to your organization?

    When your threat intelligence supplies irrelevant information, it proves unhelpful for your security operations center. So, how can you ensure that you get the information that you want and need from your threat intelligence? Step in tailored threat intelligence. Read this white paper to learn more.

  • Separated by a common language

    How are C-suites interpreting the evolving nature of cybersecurity threats? To find out, Kaspersky conducted 1,800 interviews with C-Level decision makers. This report expands upon a notable obstacle hindering C-suites: the language used to describe cyber threats.

  • Kaspersky Security Awareness

    The statistic should not surprise you. More than 80% of all cyber-incidents are caused by human error. Therefore, organizations need to focus on the concept of cybersafety. A culture rooted in cybersafe behaviors will reduce the number of incidents you must face. Read on to learn about a learning solution that helps you get there.

  • Kaspersky Endpoint Detection and Response Optimum

    The threat landscape is growing, with more sophisticated attacks being enacted than ever before. Kaspersky Endpoint Detection and Response Optimum aims to uncover the full scope of every attack. Watch now to learn more about Kaspersky Endpoint Detection and Response Optimum.

  • Kaspersky Optimum Security

    Businesses need to be able to defend themselves effectively against new, unknown, and evasive threats without overstretching budgets or employees. Advanced attacks are on the rise. 30% of successful cyberattacks now involve legitimate system tools. With this much confusion, you need a solution to help. Read on to learn more about it.

  • Reduce The Risk Of Targeted Attacks And Advanced Threats

    Threats are becoming more sophisticated, with hackers building attacks designed to circumvent specific security controls. The Kaspersky Anti Targeted Attack Platform aims to overcome these challenges by finding and preventing targeted attacks and hidden threats through a multi-layered threat detection. Read on to learn more.

  • Straightforward Protection For Your Business – Wherever You’re Heading

    With more cloud-based applications in play than ever before, IT teams are caught having to navigate and manage a vast array of new platforms, while at the same time accounting for the sea of new security concerns they have brought with them. Read on to learn how Kaspersky Endpoint Security Cloud aims to provide a single solution for IT security.

  • Kaspersky Managed Detection And Response

    With cyberattacks occurring at breakneck speeds, a reaction-driven security approach is no longer capable of preventing major security incidents. This paper looks at how Kaspersky’s Managed Detection and Response (MDR) offering is built to provide proactive awareness surrounding threats, in order to stop potential attacks. Read now to learn more.

  • Reputation And Cybersecurity: From Risk To Opportunity, And Cyber-pride

    Organizations live through their relationship with customers, and when data breaches and cybersecurity incidents threaten customer’s trust, the damage is incalculable. Read this white paper for an in-depth look at how cybersecurity influences an organization’s reputation and learn strategies you can use to protect your organization’s reputation.

  • Cyber Share TI Part 1

    Threat intelligence is virtually a universal component of all modern cybersecurity teams, and yet there is still much confusion on what exactly it means. In this first episode of a 4-part series on threat intelligence, real-world threat intelligence professionals and experts provide an introduction to threat intelligence. Watch now to learn more.

  • Cyber Share TI Part 4

    What is the appropriate threat intelligence (TI) for your business? Explore this episode, “The Way Forward,” to unlock threat intelligence testimonials from, among others, Aldermore Bank, Airbus and Kaspersky, as well as discussion around attribution, TI capabilities and more.

  • Cyber Share TI Part 2

    In the face of evolving cyberthreats, many organizations are turning to threat intelligence to strengthen their security posture. Understanding past cyberattacks can help businesses protect themselves against future threats. In this video, Kaspersky’s Lee Rendell details the course and ramifications of Not Petya. Watch to learn more.

  • Cyber Share TI Part 3

    In this third installment of Kaspersky’s Threat Intelligence series, experts sit down to talk about threat hunting. Threat hunting is a subset of threat intelligence that prioritizes a proactive approach to searching for threats and combatting them before they can develop. Watch the video now to learn more about threat hunting.

  • Concerns ebook

    Transparency. This is an essential element of Kaspersky’s fight against cybercrime. Kaspersky, a privately owned cybersecurity firm, outlines its Global Transparency Initiative in this e-book. Read on to access the initiative’s 6 steps.

  • CyberSecurity in the financial services sector: Threats and Opportunities

    According to a recent survey, more than half of financial services decision makers say they do not have the IT security expertise to be protected against threats. This report looks at the state of cybersecurity in the financial services sector, analyzing current market trends in order to provide you with deeper insight. Read on to learn more.

  • Kaspersky Threat Data Feeds and Microsoft Sentinel integration

    The modern threat landscape is so diverse and widespread that it can be difficult to identify which threats are relevant to an organization’s security posture. Kaspersky has partnered with Microsoft Sentinel and provides increased threat data in order to improve its security capabilities. Continue on to learn more.

  • Remediate Threats With Intelligence

    The number of security alerts analyzed each day in most cases exceeds the existing capacity of security teams. You need accurate and relevant threat intelligence prevent attacks. This data sheet discusses Kaspersky’s partnership with Microsoft Sentinel, which aims to help users extend their cyberthreat detection capabilities. Read on to learn more.

  • Threat hunting – what, why and how

    Take a look through this e-book for an introduction to modern threat hunting tools, and learn how a proactive, pre-emptive approach to threat management can help minimize harm and strengthen future security controls.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2023 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.