ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Dell SecureWorks

  • Seamless Security Integration During a Merger or Acquisition Process

    In addition to the challenges of brokering and completing a merger or acquisition, the logistics of integrating two or more businesses and closing potential risk gaps can be staggering. In this white paper, learn how a cybersecurity firm can deliver crucial expertise to facilitate a seamless integration of each company's cybersecurity program.

  • Four Steps to Developing a World-Class Security Program

    A reactive security approach is all too common, even though the question is not if a company will suffer an incident but when. By adopting a proactive stance, organizations minimize the likelihood of suffering a breach. In this white paper, discover 4 steps to developing a world-class security program.

  • Evolving Your Security Architecture to Meet Current and Future Needs

    The security of an organization is dependent on the quality of its enterprise information security architecture. A security architecture should be designed for the specific organization it's going to protect. In this white paper, learn how to define your security needs and reassess your security architecture as new threats develop.

  • 2018 Incident Response Insights Report

    In Secureworks 2018 Security Leaders Survey, 43% of respondents said that regular threat hunting activities were part of their incident response program. Access this 29-page research report to uncover best practices and valuable lessons learned over the past year from real-world incidents.

  • Security Maturity: Mapping the Road to Resilience

    Download this e-book for a deep dive into risk and cybersecurity actions all organizations should consider as they think through their security strategy.

  • What to Look for in an MDR Provider

    There are plenty of security providers offering Managed Detection and Response (MDR) solutions, but it is important to ensure they offer capabilities that match your business's needs. In this white paper, learn 5 key areas organizations should investigate when evaluating and selecting an MDR provider.

  • 9 Key Questions to Ask When Selecting an Incident Response Service Provider

    Many people associate the term "incident response" with recovery efforts following a major security breach. However, effective incident response is not just reactive, nor is it confined to major incidents. In this white paper, learn how an incident response provider can assist you with a range of prevention, detection, and response activities.

  • Cyber Global Warming Real Life Malscape Insights

    In this webcast, learn how you can measure your cyber-resilience with behavioral intelligence.

  • How to Reach Cybersecurity Maturity in 5 Critical Steps

    Security is often stuck in a defensive and preventive state that leaves organizations unable to detect and respond appropriately to cyberattacks and incidents. In this white paper, find out how you can adjust your organizations security maturity level with just 5 key steps and change the state of your security.

  • How Cybercriminals are Adapting to Outwit Defenses

    From July 2017 through June 2018, SecureWorks Counter Threat Unit researchers analyzed incident response outcomes and conducted original research to gain insight into threat activity and behavior across 4,400 companies. In this webcast, gain insight on the key findings from the report.

  • DIY is DOA: Cybersecurity Moves Toward Hybrid Models

    Information security always was complex and challenging. But the rise of cloud and mobile organizations has multiplied that challenge. However, information security services providers (ISSPs) can help organizations by empowering their internal resources. In this white paper, explore how using ISSPs can leverage an organization's operations.

  • 2018 State of Cybercrime

    Find out the deep, dark truth behind the underground hacker economy in the 2018 State of Cybercrime report.

  • Eliminating the Blind Spot

    Today, enterprises must obtain end-to-end visibility, detection and response capabilities required to quickly remediate breaches. In this white paper, learn how unifying advanced detection technologies for the network and endpoint with the right intelligence, people and processes can empower a security team.

  • Threat Intelligence Executive Report

    In the last year, the number of sophisticated attacks has increased and threat actors have demonstrated greater adaptability. However, implementing security best practices could limit the impact of many intrusions. In this research report, learn about key developments in the cybercrime threat landscape.

  • SecureWorks and McLaren Partnership

    SecureWorks is the security partner of McLaren Group. Using SecureWorks has allowed McLaren to accelerate threat detection. SecureWorks applies machine learning as well as human and artificial intelligence to process logs. In this webcast, Jonathan Neal and Paul Brimacombe discuss their experience partnering with SecureWorks.

  • The Forrester Wave: Managed Security Services Providers (MSSPs)

    This Forrester report covers a 26-criterion evaluation of European management security service providers (MSSPs). It identified the most significant MSSPs along with researching, analyzing and scoring them. The report also shows how each provider measures up and helps security leaders make the right choice.

  • 2018 State of Cybercrime

    Find out the deep, dark truth behind the underground hacker economy.

  • Security Maturity: Mapping the Road to Resilience

    Download this e-book for a deep dive into risk and cybersecurity actions all organizations should consider as they think through their security strategy.

  • How to Reach Cybersecurity Maturity in 5 Critical Steps

    Security is often stuck in a defensive and preventive state that leaves organizations unable to detect and respond appropriately to cyberattacks and incidents. In this white paper, find out how you can adjust your organizations security maturity level with just 5 key steps and change the state of your security.

  • Secureworks Security Maturity Model

    Learn how you can evaluate your organization's cybersecurity maturity based on its business operations and risk profile.

  • Reporting to the Board - A Toolkit for CISOs

    Boards oversee risk, not operations. Rather than tell them how your cybersecurity program works, show them how and how well risks are being managed. Download this CISO toolkit for tips and techniques to approach your board of directors about cybersecurity.

  • What Boards Should Know About The Company's Cybersecurity Strategy

    Achieving resiliency requires a proactive security strategy. In this resource, find out how a resiliency model should look like from a board or C-suite perspective.

  • The Relationship, Nature, and Flow of Information and Communication Among the CISO, C-Suite and Board of Directors

    62% of security executives say the frequency of communications has increased and that the impact has been positive, but many organizations still experience a serious communication breakdown among the CISO, C-suite and Board of Directors. Access this resource to learn how supporting a risk communication workflow can help close the cybersecurity gap.

  • 2018 Incident Response Insights Report

    In Secureworks 2018 Security Leaders Survey, 43% of respondents said that regular threat hunting activities were part of their incident response program. Access this 29-page research report to uncover best practices and valuable lessons learned over the past year from real-world incidents.

  • How C-Suite Leaders Win By Understanding the Role of the CISO

    This white paper details the role of the CISO, taking an in-depth look at how CISOs can strike the right balance between organizational strategy and risk management.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.