ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:BlackBerry

  • How to Achieve Zero Touch in a Zero Trust Environment

    Implementing perimeter-based security architecture against modern threats will prove futile. Today, security must be traced back to the user, and networks must always be assumed as hostile. But doing so puts employee productivity at risk. Watch this webcast to go in-depth about zero trust and it can be balanced with functionality.

  • Decade of the RATs

    The world is concerned with cyber espionage in the perpetual firestorm of information gathering, and the prime target? Linux servers. Learn why in this report as well as different types of remote access trojans (RATs) and what they look like.

  • State of Ransomware

    The increased reporting of cyber incidents among large companies in ANZ in the first half of 2020 has been evident. A handful of ransomware families are dominating these attacks. Browse this report to investigate some of the tactics used by these ransomware families, their high profile victims, and strategies used to defend against these threats.

  • MITRE ATT&CK: Security Evaluation Overview

    MITRE ATT&CK offers an unbiased, detection-based evaluation designed to provide organizations with insights and information regarding their vulnerabilities – it’s not a competitive analysis with winners, scores or ranking. Watch this webinar, which features 2 BlackBerry experts, for a comprehensive overview of MITRE ATT&CK Evaluations.

  • MITRE ATT&CK: The Power of Prevention

    In this brief webinar, join industry experts as they provide insight into optimizing the MITRE ATT&CK framework using artificial intelligence and machine learning – providing an overview of the framework and why it’s important, as well as the role of AI for enhance threat detection and prevention.

  • Panelist Discussion with Q&A

    In this 14-minute panelist discussion with Q&A, join industry experts as they provide insight into commonly asked questions and hot topics surrounding the MITRE ATT&CK framework – discussing topics from hypothetical testing scenarios to its efficacy as a resource during the COVID-19 pandemic, and more. Watch now to get started.

  • Reece Group Protects Endpoints and Automates Threat Management

    In this case study, follow the Reece Group, a plumbing equipment supplier with a rapidly expanding number of endpoints, as they partner with Blackberry to address their endpoint security and threat management concerns.

  • Continuous Authentication as the Zero Trust Multiplier

    The spike in remote work as a result of COVID-19 has all but eliminated the existence of organizational perimeters. Luckily, widely embraced approaches like zero trust serve as a powerful foundation for a robust security strategy. In this article, discover why continuous authentication is the logical next step in zero trust approaches.

  • Dexar Group Takes on Cybersecurity

    In this case study, follow the Dexar Group, a real estate and property management organization, as they partner with ForwardIT to deploy CylancePROTECT and reduce the time and effort needed to managed their nearly 450 endpoints, addressing the security needs of their remote employees and BYOD devices.

  • Nefilim Ransomware and Mitigating Attacks in the COVID-19 Era

    In Australia, organizations across every sector have been on the receiving end of increasingly frequent and complex malware and ransomware attacks. This article highlights one of the most prominent ransomware attacks, discusses cybersecurity in the COVID-19 era, and more. Read on to get started.

  • B&R Enclosures Takes on Cybersecurity

    In this case study, follow B&R Enclosures, leading specialist in the design and manufacture of industrial equipment in the ‘Australasia’ region, as they incorporate CylancePROTECT in the wake of 2 ransomware attacks in order to leverage the power of AI to detect and prevent future malware and ransomware campaigns.

  • The Australian Museum Takes on Cybersecurity

    In this case study, follow the Australian Museum, keepers of a vast collection of sensitive historic and cultural information, as they partner with CylancePROTECT to implement a multi-layer approach to security that enables them to prevent malware attacks and secure their invaluable research data.

  • Property Brokers Take on Cybersecurity

    In this case study, learn how Property Brokers, New Zealand’s largest provincial real estate organization was able to secure their company-owned endpoints using CylancePROTECT.

  • Understanding and Fighting Cybersecurity Threats in Telemedicine

    The recent spread of COVID-19 has created a surge in demand for increasingly popular telemedicine services. Unfortunately, cybercriminals caught wind of this lucrative new vector, putting practitioners and patients at risk. Download this white paper for an overview of the cybersecurity risks in telemedicine and how to overcome them.

  • Using Zero Trust to Enable Secure Remote Access

    As organizations continue to implement zero trust technologies, it’s critical to keep in mind that achieving an effective zero trust access control posture requires careful coordination and organization-wide buy-in. This SANS white paper offers additional expertise, including common challenges and key elements to consider.

  • Satellite Case Study

    In this case study learn how BlackBerry Cylance was able to help Satellite Healthcare meet their security requirements and ensure uninterrupted access to electronic medical record (EMR) and clinical desktop systems healthcare professionals rely upon to provide quality care.

  • A Devastating Assault on Healthcare

    The typical healthcare environment is a perfect storm of vulnerabilities, making it attractive to ransomware attacks. In this white paper, learn how BlackBerry Cylance helps strengthen cybersecurity in healthcare organizations with a prevention-first, predictive security approach.

  • Phoenix Children's Takes on Cybersecurity

    In this case study, learn how Phoenix Children's Hospital used CylancePROTECT to help protect against attackers hacking into patient data and disrupting hospital operations.

  • BlackBerry Cylance Cybersecurity Maturity Evaluation Guide

    In this guide, discover a methodology and roadmap for organizations of all sizes to use in assessing and advancing the maturity of their cyber risk management programs.

  • Ransomware Remediation and Prevention

    Download this solution brief to learn about BlackBerry Cylance's native AI platform that can help organizations minimize the risksof a ransomware breach by transitioning from a reactive to a prevention first security posture.

  • Threat Models and Methodologies

    This white paper explores what MITRE has achieved in creating the ATT&CK Enterprise framework, and how security practitioners can leverage it to better dissect and assess the security problems at hand. Download now to learn more.

  • Expanding Machine Learning Applications on the Endpoint

    Endpoint detection and response (EDR) has emerged as a key component of an endpoint security strategy. But according to recent research, customers believe there is still opportunity for improvements in EDR. Download this report to learn about the current EDR approaches taken and how machine learning can benefit EDR.

  • Sydney Opera House Case Study

    The Sydney Opera House embarked on a renewal process which included updating their endpoint security system. They were looking for a solution that could help address a number of challenges including cyberattacks and compliance. Download this case study to learn why they choose to deploy CylancePROTECT.

  • Security Gets Smart with AI

    In this research report, explore key findings from a SANS survey of cybersecurity professionals who are involved with or interested in the use of AI for improving the security of their organization.

  • Explore the ROI of CylancePROTECT and CylanceOPTICS

    To protect endpoints, servers, and cloud workloads, CylancePROTECT and CylanceOPTICS provide an AI-driven threat prevention, detection, and response platform. In this Forrester Total Economic Impact study, examine the potential ROI enterprises realize after deploying these Cylance platforms.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.