ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:BlackBerry

  • BlackBerry MITRE ATTACK APT29 Evaluation

    In conjunction with the framework, MITRE ATT&CK also conducts security evaluations without commentary or bias – the purpose is to provide objective information regarding how vendors fare against certain threat techniques. Download this report for BlackBerry’s analysis and interpretation of MITRE ATT&CK APT29 evaluation data.

  • MITRE ATT&CK: Security Evaluation Overview

    MITRE ATT&CK offers an unbiased, detection-based evaluation designed to provide organizations with insights and information regarding their vulnerabilities – it’s not a competitive analysis with winners, scores or ranking. Watch this webinar, which features 2 BlackBerry experts, for a comprehensive overview of MITRE ATT&CK Evaluations.

  • MITRE ATT&CK: The Power of Prevention

    In this brief webinar, join industry experts as they provide insight into optimizing the MITRE ATT&CK framework using artificial intelligence and machine learning – providing an overview of the framework and why it’s important, as well as the role of AI for enhance threat detection and prevention.

  • Panelist Discussion with Q&A

    In this 14-minute panelist discussion with Q&A, join industry experts as they provide insight into commonly asked questions and hot topics surrounding the MITRE ATT&CK framework – discussing topics from hypothetical testing scenarios to its efficacy as a resource during the COVID-19 pandemic, and more. Watch now to get started.

  • Reece Group Protects Endpoints and Automates Threat Management

    In this case study, follow the Reece Group, a plumbing equipment supplier with a rapidly expanding number of endpoints, as they partner with Blackberry to address their endpoint security and threat management concerns.

  • Continuous Authentication as the Zero Trust Multiplier

    The spike in remote work as a result of COVID-19 has all but eliminated the existence of organizational perimeters. Luckily, widely embraced approaches like zero trust serve as a powerful foundation for a robust security strategy. In this article, discover why continuous authentication is the logical next step in zero trust approaches.

  • Dexar Group Takes on Cybersecurity

    In this case study, follow the Dexar Group, a real estate and property management organization, as they partner with ForwardIT to deploy CylancePROTECT and reduce the time and effort needed to managed their nearly 450 endpoints, addressing the security needs of their remote employees and BYOD devices.

  • Nefilim Ransomware and Mitigating Attacks in the COVID-19 Era

    In Australia, organizations across every sector have been on the receiving end of increasingly frequent and complex malware and ransomware attacks. This article highlights one of the most prominent ransomware attacks, discusses cybersecurity in the COVID-19 era, and more. Read on to get started.

  • B&R Enclosures Takes on Cybersecurity

    In this case study, follow B&R Enclosures, leading specialist in the design and manufacture of industrial equipment in the ‘Australasia’ region, as they incorporate CylancePROTECT in the wake of 2 ransomware attacks in order to leverage the power of AI to detect and prevent future malware and ransomware campaigns.

  • The Australian Museum Takes on Cybersecurity

    In this case study, follow the Australian Museum, keepers of a vast collection of sensitive historic and cultural information, as they partner with CylancePROTECT to implement a multi-layer approach to security that enables them to prevent malware attacks and secure their invaluable research data.

  • Property Brokers Take on Cybersecurity

    In this case study, learn how Property Brokers, New Zealand’s largest provincial real estate organization was able to secure their company-owned endpoints using CylancePROTECT.

  • Understanding and Fighting Cybersecurity Threats in Telemedicine

    The recent spread of COVID-19 has created a surge in demand for increasingly popular telemedicine services. Unfortunately, cybercriminals caught wind of this lucrative new vector, putting practitioners and patients at risk. Download this white paper for an overview of the cybersecurity risks in telemedicine and how to overcome them.

  • Using Zero Trust to Enable Secure Remote Access

    As organizations continue to implement zero trust technologies, it’s critical to keep in mind that achieving an effective zero trust access control posture requires careful coordination and organization-wide buy-in. This SANS white paper offers additional expertise, including common challenges and key elements to consider.

  • BlackBerry Spark Solution Brief

    By harnessing artificial intelligence, machine learning, simplified management, and automation, BlackBerry Spark Suite provides visibility across all endpoints, including desktops, mobile devices, servers, and IoT. Download this solution brief to learn more about Blackberry Spark Suite.

  • Satellite Case Study

    In this case study learn how BlackBerry Cylance was able to help Satellite Healthcare meet their security requirements and ensure uninterrupted access to electronic medical record (EMR) and clinical desktop systems healthcare professionals rely upon to provide quality care.

  • A Devastating Assault on Healthcare

    The typical healthcare environment is a perfect storm of vulnerabilities, making it attractive to ransomware attacks. In this white paper, learn how BlackBerry Cylance helps strengthen cybersecurity in healthcare organizations with a prevention-first, predictive security approach.

  • Phoenix Children's Takes on Cybersecurity

    In this case study, learn how Phoenix Children's Hospital used CylancePROTECT to help protect against attackers hacking into patient data and disrupting hospital operations.

  • BlackBerry Cylance Cybersecurity Maturity Evaluation Guide

    In this guide, discover a methodology and roadmap for organizations of all sizes to use in assessing and advancing the maturity of their cyber risk management programs.

  • Ransomware Remediation and Prevention

    Download this solution brief to learn about BlackBerry Cylance's native AI platform that can help organizations minimize the risksof a ransomware breach by transitioning from a reactive to a prevention first security posture.

  • Threat Models and Methodologies

    This white paper explores what MITRE has achieved in creating the ATT&CK Enterprise framework, and how security practitioners can leverage it to better dissect and assess the security problems at hand. Download now to learn more.

  • Expanding Machine Learning Applications on the Endpoint

    Endpoint detection and response (EDR) has emerged as a key component of an endpoint security strategy. But according to recent research, customers believe there is still opportunity for improvements in EDR. Download this report to learn about the current EDR approaches taken and how machine learning can benefit EDR.

  • Sydney Opera House Case Study

    The Sydney Opera House embarked on a renewal process which included updating their endpoint security system. They were looking for a solution that could help address a number of challenges including cyberattacks and compliance. Download this case study to learn why they choose to deploy CylancePROTECT.

  • Security Gets Smart with AI

    In this research report, explore key findings from a SANS survey of cybersecurity professionals who are involved with or interested in the use of AI for improving the security of their organization.

  • Explore the ROI of CylancePROTECT and CylanceOPTICS

    To protect endpoints, servers, and cloud workloads, CylancePROTECT and CylanceOPTICS provide an AI-driven threat prevention, detection, and response platform. In this Forrester Total Economic Impact study, examine the potential ROI enterprises realize after deploying these Cylance platforms.

  • Enterprise Mobile Apps: The Time Is Now

    Access this essential whitepaper to discover the foundation of mobile apps for enterprise, including 3 key factors businesses need to weight if they're to capitalize on what mobile apps can do for their bottom line.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.