All Research Sponsored By:Dell SecureWorks

-
Top 5 Reasons to Use Taegis™ XDR to Replace Your SIEM
Security Information and Event Management (SIEM) plays a key role in today’s security operations – but as security threats become more sophisticated and harder to detect, SIEM solutions have failed to follow suit. In this infographic we compare how XDR and SIEMs have addressed modern threats – read on to get started.
-
Threat Hunting Assessment: Prepare and Defend Against the Unknown Threat
In an effort to better prepare for and defend against today’s sophisticated cyberthreats, organizations have begun embracing proactive security measures – such as threat hunting. Read this Threat Hunting Assessment to unlock expert insight into the benefits of threat hunting and guidance for getting started.
-
Leveraging AI to Automate Vulnerability Management
Today’s organizations need vulnerability management (VM) solutions that are built to maximize risk reduction. With the power of ML, these same organizations can minimize the manual burden on InfoSec and IT operations teams. Download this data sheet to explore how Secureworks’ VM solution strives to do all this and more.
-
The Impact of XDR in the Modern SOC
Extended detection and response (XDR) is gaining momentum in the security arena. ESG recently surveyed IT/InfoSec professionals across multiple industry verticals to better understand the market perception of XDR, as well as value points and challenges that come with it. Access the full ESG report to see the impact of XDR in the modern SOC.
-
Threat Intelligence Executive Report
The Secureworks Counter Threat Unit (CTU) research team analyzes security threats and helps organizations protect their systems. During November and December 2020, CTU researchers observed notable developments in threat behaviors, the global threat landscape, and security trends, and identified lessons to consider.
-
Secureworks Taegis XDR: Where Security Analytics Meets ThreatIntelligence Expertise
XDR combines security analytics and threat intelligence expertise to enable your security analysts to precisely pinpoint unknown and sophisticated threats with advanced analytics, accelerated investigation and response and community-applied intelligence.
-
The Cost of Making the Front Page: What You Need to Know About the Growing Threat of Public Breaches
A September 2018 attack on British Airways costing them close to $1B USD did not involve data encryption or ransom demands. Instead it saw cybercriminals using third-party code on the BA website to fraud 380,000 people out of their credit card numbers. These ‘public breaches’ are on the rise – read this white paper to learn more.
-
The Business Executive’s Guide to Cybersecurity
The days of cybersecurity being a siloed business function is no longer appropriate when considering the financial, reputational and legal implications of today’s cyberthreats. This white paper provides a guide for communication and collaboration between technical and non-technical business leaders – read on to learn more.
-
How to Reach Cybersecurity Maturity in 5 Critical Steps
Security is often stuck in a defensive and preventive state that leaves organizations unable to detect and respond appropriately to cyberattacks and incidents. In this white paper, find out how you can adjust your organizations security maturity level with just 5 key steps and change the state of your security.
-
Your Guide to Threat Intelligence, AI & Incident Response
Organizations must now go beyond automating reactive measures. Cybersecurity now requires infosec professionals to work toward proactive detection to preemptively avoid or thwart threats. In this e-guide, find everything you need to know about threat intelligence platforms, AI in cybersecurity, and incident response planning.
-
GDPR: The Race is on for Compliance
Learn if your organization is ready to ensure its compliance to the GDPR and what you need to know to take it seriously.
-
Overcoming Security Breaches and Minimizing the Impact
Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
-
Five Critical Rules for Firewall Management
This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organisations improve their firewall management.
-
Presentation Transcript: Incident Response - Are you prepared?
In this presentation transcript, Lee Lawson, Head of Response Service for Dell SecureWorks EMEA outlines a successful Incident Response approach and best practices for your organisation.
-
Presentation Transcript: Malware Reloaded - Mitigating the Next Evolution of Cyber Attacks
View this presentation transcript to explore the evolution of the threat landscape, new behaviours that have been identified, a quantitative analysis of threat intelligence, and inferences, conclusions, and the road ahead.
-
Presentation Transcript: Helping to Reduce Compliance Costs for the UK Public Sector
Dell SecureWorks has vast experience in helping customers achieve successful audits against compliance standards. In this presentation trancript, Lee Lawson, Head of Security Testing and Response services with Dell SecureWorks, offers advice on how to maximize your budget.
-
Presentation Transcript: The Cybercrime War; When Are We Going to Win?
Why are information security issues so persistent? Why does it feel like we win small battles, yet the war keeps escalating? What does the next 20 years look like? Erik Petersen, Vice President of Security and Risk Consulting at Dell SecureWorks discuss micro and macro-economic theory to grapple with the core questions of “why.”
-
Presentation Transcript: Best Practices for Implementation of an Intrusion Prevention and Intrusion Detection Systems
View this presentation transcript to explore the benefits of deploying IPS & IDS, challenges and considerations when implementing IPS & IDS, features to look for when selecting a device, deployment methodologies and more.
-
Presentation Transcript: Securing the Virtualized Environment - Keeping the Dream Alive
View this presentation transcript as Neil Anderson, a Principal Consultant from the Infrastructure Protection & Mobility team explores roadblocks of securing virtual environments, common pitfalls, and offers advice on combating these issues.
-
Presentation Transcript: Has Your QSA Thrown You Under a Bus?
After working with hundreds of organizations striving to achieve PCI compliance, we understand that one of the biggest challenges is finding and maximizing the use of a quality QSA. This presentation transcript will give you examples of how a bad QSA can derail your PCI program.
-
Presentation Transcript: How to Secure Your Mobile Devices
In this presentation transcript, Paul Pearston, a Senior Security Engineer at Dell SecureWorks, discusses the most serious security threats to mobile devices and recommends specific approaches for securing the mobile organization.
-
Presentation Transcript: Vulnerability Scanning and Compliance
In this presentation transcript, Lee Lawson, Head of Security Testing and Response at Dell SecureWorks, explores vulnerability scanning drivers, pros and cons for different vulnerability scanning solutions, best fit solutions for specific regulatory compliance standards, and more.
-
Presentation Transcript: Go Forth & Comply - New Virtualization Guidelines from the PCI Council
In this presentation transcript, principal security consultant at Dell SecureWorks, discuss the issues confronting organizations who wish to use virtualization technologies with their Cardholder Data Environment, summarize and clarify the recommendations from the PCI council and more.