ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Dell SecureWorks

  • How Secureworks Offers a Holistic Approach to Security

    In today’s increasingly dangerous threat landscape, only a unified, integrated approach to security can help your organization address these challenges. This white paper talks about how SecureWorks leverages artificial intelligence and machine learning to help organizations build a holistic cybersecurity approach – read on to learn more.

  • From Reactive to Proactive: Keys to Shifting Your Cybersecurity Strategy

    A constant state of readiness is crucial when it comes to cybersecurity. Senior leaders who embrace this ethos stand a much better chance of minimizing the damages, risks, and costs than leaders who have no plan and respond to threats reactively. How do you take on this stance? Read this white paper to learn 4 keys to security proactivity.

  • You’ve Been Compromised: Now What?

    Smart cybersecurity operations require extensive preparation and planning. Without them, organizations run the risk of poorly coordinated incident response (IR) activities that could cause more damage than the compromise itself. So how do you respond the right way? Read this white paper to get the answer.

  • The Cost of Making the Front Page: What You Need to Know About the Growing Threat of Public Breaches

    A September 2018 attack on British Airways costing them close to $1B USD did not involve data encryption or ransom demands. Instead it saw cybercriminals using third-party code on the BA website to fraud 380,000 people out of their credit card numbers. These ‘public breaches’ are on the rise – read this white paper to learn more.

  • How to Consolidate Your Cybersecurity Stack

    As a result of rapid innovation by threat actors in the past decade, the number of layers in the average cybersecurity stack is now up to 47. This number wouldn’t seem so horrible if these tools worked well together, but they don’t. It may be time to consolidate your cybersecurity. Read this white paper to learn the framework for doing so.

  • The Clock is Always Ticking: 24/7 Cybersecurity Monitoring Takes its Toll

    65% of Security Operations Center (SOC) professionals say stress has caused them to think about quitting. Needless to say, security is stressful, but relief is possible. Read this white paper to explore the issue of increasing demands on security practitioners and to explore several avenues for automating and reducing workloads for team members.

  • Keeping Tabs on a Constantly Evolving Threat Landscape

    Criminal threat actors aren’t just developing their tactics and techniques – they’re updating their ‘business’ strategies, too. Cybercriminal operators are adopting strategies often seen in the legitimate business world to increase return on investment (ROI) and operational efficiency. Jump into this white paper to learn more.

  • Endpoint Security: Protecting Your Business Wherever It Goes

    The spread of COVID-19 forcing organizations to quickly shift towards working from home introduced a litany of new endpoint security risks while also amplifying existing ones. Read this white paper for a closer look at these challenges and best practices for addressing them.

  • How Much is Too Much Cybersecurity Noise?

    For security professionals, cybersecurity alert volume has gotten to the point where it’s almost too noisy to sift through – creating significant security challenges. So, what can security teams do to make sense of the noise? Read this white paper to find out.

  • Managed Detection & Response (MDR): Selective Outsourcing for Understaffed SOCs

    Even though the managed detection and response (MDR) market is in its infancy, interest and adoption has spiked dramatically – with most organizations (79%) either currently evaluating or considering adopting an MDR tool. Read this research report for a deep dive into the MDR market, common approaches and guidance for selecting an MDR provider.

  • Changing the Rules of Ransomware

    Ransomware has become a series threat to an organization’s data – and there is conflicting advice on whether an organization should pay the ransom or not. This webinar provides a closer look at the evolution of ransomware attacks, which regions and industries are most affected, why an organization should or shouldn’t pay, and more.

  • The Business Executive’s Guide to Cybersecurity

    The days of cybersecurity being a siloed business function is no longer appropriate when considering the financial, reputational and legal implications of today’s cyberthreats. This white paper provides a guide for communication and collaboration between technical and non-technical business leaders – read on to learn more.

  • Secureworks Threat Intelligence Executive Report

    During May and June 2020, the Secureworks Counter Threat Unit research team observed notable developments in threat behaviors, the global threat landscape, and security trends, and identified lessons to consider. Download the report for key takeaways.

  • Secureworks success story - MLC Life Insurance

    Watch this video to learn how MLC Life Insurance’s partnership with SecureWorks enhanced their customer experience.

  • Panel Discussion: Securing the Cloud

    The current pandemic has had considerable impacts on business environments and cloud usage – causing security leaders to revisit their cloud security strategies. In this webinar, join a panel of Secureworks security leaders as they explore the common challenges organizations are facing in securing their cloud environments.

  • Threat Intelligence Executive Report

    The Secureworks Counter Threat Unit (CTU) regularly conducts research and releases reports related to current developments in threat behaviors and cybersecurity trends. In their most recent Threat Intelligence report, analyze March and April 2020 to discover how COVID-19 shaped the threat landscape, workplace trends, and more.

  • Empowering Business Innovation: Ricoh USA, Inc. Partners for Success

    In this case study, discover how Ricoh, in collaboration with Secureworks, implemented, monitored and managed end-to-end security services in order to support their digital transformation initiatives and growing network complexity.

  • Detect and Stop Advanced Threats Faster to Reduce Security Risk

    In this Enterprise Strategy Group (ESG) white paper, learn how leveraging solutions like SOAPA, machine learning, human analysis, and more can help your organization detect and stop advanced threats faster and reduce security risk.

  • What You Need to Know to Combat the Insider Threat

    In this white paper, you will learn to better understand the potential damage an insider threat can cause an organization and appropriate identification techniques to help you mitigate the risk they pose to an organization.

  • What Buyers Need to Know before Investing in Managed Detection and Response (MDR)

    This webinar helps to make sense of the noisy market of managed detection and response (MDR) solutions and share IDC’s unbiased views and data points. It also includes information on Secureworks’ MDR offering. View the webinar to learn about the trends shaping the dynamic MDR market today.

  • Top 8 Cybersecurity Incident Response Plan Failures

    Listen to this webcast where Rob Lelewski, Senior Incident Response Consultant, will highlight and discuss the common organizational shortcomings observed by Secureworks, which hinder organizations’ abilities to respond to security incidents.

  • Breaking the Kill Chain

    Malicious actors responsible for threats have a toolbox of exploit techniques at their disposal. They often combine several intrusion tools and techniques to compromise and maintain access to their target. Download this white paper to look at the different stages of the Kill Chain and how to break it.

  • Lessons from the Field: How are Skilled Testers Infiltrating?

    In this webcast, hear from some of Secureworks’ most skilled testers, Nate Drier and Jared McLaren, as they talk about lessons learned from some of their most challenging engagements and the trends they are seeing with clients and their defense practices.

  • Secureworks Security Maturity Model

    The Secureworks Security Maturity Model is designed to help organizations evaluate and understand their current security maturity in order to develop strategies and target areas for improvement. Want to learn more? View this webcast today.

  • Your Guide to Threat Intelligence, AI & Incident Response

    Organizations must now go beyond automating reactive measures. Cybersecurity now requires infosec professionals to work toward proactive detection to preemptively avoid or thwart threats. In this e-guide, find everything you need to know about threat intelligence platforms, AI in cybersecurity, and incident response planning.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.