ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Dell SecureWorks

  • The Impact Of Xdr In The Modern Soc

    Extended detection and response (XDR) has been gaining momentum in the security arena. ESG surveyed IT/InfoSec professionals across multiple industry verticals to better understand the market perception of XDR, as well as value points and challenges that come with it. Access the full ESG report to see the impact of XDR in the modern SOC.

  • MDR Done Right

    The evolving cyberthreat landscape, the cyber skills shortage—these are 2 top reasons that organizations are turning to Managed Detection and Response (MDR) services, like Secureworks’ Taegis ManagedXDR, to bolster their security programs. Browse this landing page and unlock 3 benefits of Secureworks’ service, including comprehensive monitoring.

  • What’s Next in Security: Secureworks’ Rafe Pilling discusses the cyber threat landscape

    As the cybersecurity threat landscape grows increasingly complex, protecting your organization means staying up to date on the latest threats. In this episode of “What’s Next? In Security,” Secureworks’ Rafe Pilling breaks down the present threat landscape.

  • XDR vs. SIEM: A Cybersecurity Leader’s Guide

    More and more businesses have adopted Extended Detection and Response (XDR) services to strengthen their security operations in the expanding cyberattack landscape. But what makes an XDR service different than a Security Information and Event Management (SIEM) tool? Browse this white paper for a comparison of the services.

  • Protecting Your Profits: The New Economics of Cybersecurity and Its Four Best Practices

    What is a cybersecurity necessity that your business should add to its must-have list? This white paper advocates for your answer to be rationalized cybersecurity economics. Continue on to understand the 3 phases of cybersecurity economics and to unlock 4 best practices for strengthening your cybersecurity economics.

  • 2022 State of the Threat, A Year in Review

    From June 2021 to June 2022, Secureworks Counter Threat Unit researched trends across the threat landscape—all of which are detailed in this report, “2022 State of the Threat.” To arm your organization with knowledge, read on to unlock 6 key findings.

  • The Long Road Ahead to Ransomware Preparedness

    According to ESG, 79% of organizations have suffered a ransomware attack over the last year. This ESG report analyzes ransomware, leveraging relevant statistics to provide you with strategies for developing ransomware preparedness.Read the full report and prepare your defense against ransomware today.

  • Secureworks Threat Intelligence Executive Report

    Read through this white paper to learn how the Secureworks Counter Threat Unit (CTU) research team can help your organization analyze security vulnerabilities and protect their systems from the threats that do the most harm... and not just the ones make the most noise.

  • How XDR can help boost your security operations

    31% of organizations cite security silos as obstacles to stronger security resilience, and 45% of organizations use more than 20 tools to investigate and respond to an incident – today’s complex IT environments need a more effective approach to security. Watch this webinar to learn how XDR can boost your security operations.

  • XDR buyer’s guide

    According to Gartner, extended detection and response (XDR) describes a unified security incident detection and response platform that automatically collects and correlates data from multiple proprietary security components. Access this XDR buyer’s guide to explores criteria you should look for when selecting a vendor.

  • 2021 State of the Threat

    2021 was a year dominated by stories of cyberattacks: State-sponsored supply chain attacks, cyber-espionage, ransomware and more. Access this report, 2021 State of the Threat: A Year in Review, to learn more about the specific threats (and threat types) that made headlines in 2021.

  • The Impact of XDR in the Modern SOC

    Extended detection and response (XDR) is gaining momentum in the security arena. ESG recently surveyed IT/InfoSec professionals across multiple industry verticals to better understand the market perception of XDR, as well as value points and challenges that come with it. Access the full ESG report to see the impact of XDR in the modern SOC.

  • Your Guide to Threat Intelligence, AI & Incident Response

    Organizations must now go beyond automating reactive measures. Cybersecurity now requires infosec professionals to work toward proactive detection to preemptively avoid or thwart threats. In this e-guide, find everything you need to know about threat intelligence platforms, AI in cybersecurity, and incident response planning.

  • GDPR: The Race is on for Compliance

    Learn if your organization is ready to ensure its compliance to the GDPR and what you need to know to take it seriously.

  • 10 Tips to Help You Minimize the Duration and Impact of a Security Breach

    Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.

  • Five Critical Rules for Firewall Management

    This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organisations improve their firewall management.

  • Presentation Transcript: Incident Response - Are you prepared?

    In this presentation transcript, Lee Lawson, Head of Response Service for Dell SecureWorks EMEA outlines a successful Incident Response approach and best practices for your organisation.

  • Presentation Transcript: Malware Reloaded - Mitigating the Next Evolution of Cyber Attacks

    View this presentation transcript to explore the evolution of the threat landscape, new behaviours that have been identified, a quantitative analysis of threat intelligence, and inferences, conclusions, and the road ahead.

  • Presentation Transcript: Helping to Reduce Compliance Costs for the UK Public Sector

    Dell SecureWorks has vast experience in helping customers achieve successful audits against compliance standards. In this presentation trancript, Lee Lawson, Head of Security Testing and Response services with Dell SecureWorks, offers advice on how to maximize your budget.

  • Presentation Transcript: The Cybercrime War; When Are We Going to Win?

    Why are information security issues so persistent? Why does it feel like we win small battles, yet the war keeps escalating? What does the next 20 years look like? Erik Petersen, Vice President of Security and Risk Consulting at Dell SecureWorks discuss micro and macro-economic theory to grapple with the core questions of “why.”

  • Presentation Transcript: Best Practices for Implementation of an Intrusion Prevention and Intrusion Detection Systems

    View this presentation transcript to explore the benefits of deploying IPS & IDS, challenges and considerations when implementing IPS & IDS, features to look for when selecting a device, deployment methodologies and more.

  • Presentation Transcript: Securing the Virtualized Environment - Keeping the Dream Alive

    View this presentation transcript as Neil Anderson, a Principal Consultant from the Infrastructure Protection & Mobility team explores roadblocks of securing virtual environments, common pitfalls, and offers advice on combating these issues.

  • Presentation Transcript: Has Your QSA Thrown You Under a Bus?

    After working with hundreds of organizations striving to achieve PCI compliance, we understand that one of the biggest challenges is finding and maximizing the use of a quality QSA. This presentation transcript will give you examples of how a bad QSA can derail your PCI program.

  • Presentation Transcript: How to Secure Your Mobile Devices

    In this presentation transcript, Paul Pearston, a Senior Security Engineer at Dell SecureWorks, discusses the most serious security threats to mobile devices and recommends specific approaches for securing the mobile organization.

  • Presentation Transcript: Vulnerability Scanning and Compliance

    In this presentation transcript, Lee Lawson, Head of Security Testing and Response at Dell SecureWorks, explores vulnerability scanning drivers, pros and cons for different vulnerability scanning solutions, best fit solutions for specific regulatory compliance standards, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.