ComputerWeekly.com Research Library

Powered by Bitpipe.com

Intrusion Prevention Research

  • Indicators of Compromise and Why It Takes Six-Plus Months to ID a Breach

    Sponsored by: BMC

    Each year, cybercriminals find novel ways to bypass existing security measures and disrupt workflows. In order to effectively protect sensitive data, security approaches need to be an endless, ongoing effort as well. But identifying the indicators of an attack or compromise is tricky. Download this white paper for tips to get started.

  • Why IDS is Ineffective for Linux Production Environments

    Sponsored by: Capsule8

    While intrusion detection systems (IDS) may have been a core component in traditional security strategies, they lack the scalability, agility and visibility to keep up with today’s fast-paced cyberattacks. Download this white paper to discover 9 ways IDS in no longer a viable security option and how to detect threats in modern environments.

  • All Good Remediation Strategies Begin with Collaboration

    Sponsored by: Vulcan

    As cyberattacks grow more frequent as a result of environments becoming more complex, it’s more important than ever for disparate security efforts to be unified under a cohesive strategy. This blog post highlights the benefits of a collaborative remediation approach and offers best practices for cultivating a collaborative remediation culture.

  • Runtime Memory Analysis: A Better Way Forward for Vulnerability Management

    Sponsored by: Rezilion

    According to the IDC, large-to-very large enterprises spend 7-10% of their security budget on vulnerability management. However, firms with strong security are equally breached by known vulnerabilities as those with poor security posture. So, what is the best way to approach vulnerability prioritization? Download this white paper to find out.

  • The Problem with CVSS Scores & What It Means for Vulnerability Management

    Sponsored by: Vulcan

    While CVSS scores are a helpful way to demonstrate and share information about the severity of a vulnerability, it’s not viable as a standalone prioritization tool. In this article, observe an overview of the shortcomings of CVSS scoring as a risk management tool and best practices for using it appropriately.

  • Your Guide to Mastering Vulnerability Remediation

    Sponsored by: Vulcan

    In order to preemptively contain threats, today’s organizations must have policies, processes and tools in place in order to adequately detect and assess vulnerabilities. This article highlights 8 best practices your organization can take to overcome the common barriers to implementing effective vulnerability remediation. Read on to get started.

  • Vulnerability Remediation in Three Steps

    Sponsored by: Vulcan

    As organizational environments become increasingly complex and security tools more disparate, the teams responsible for vulnerability remediation find themselves dealing with an overwhelming workload. In this article, discover 3 easy steps organizations can take to lower vulnerability risk and improving security posture.

  • Vulnerability Management 2020 Navigating to New Heights

    Sponsored by: Vulcan

    Much like the cyberthreat landscape, vulnerability management approaches are constantly evolving to protect organizations against a never-ending onslaught of risks. This white paper exposes the limitations of traditional vulnerability management, and explores where vulnerability management needs to go to meet today’s security needs.

  • Your Vulnerability Management Process Isn't Working

    Sponsored by: Vulcan

    When it comes to vulnerability discover and remediation, it’s easy to get caught up in the details. Every now and then it’s important for CISOs to take a step back and make sure you’re not missing the security forest for the vulnerability trees. This article focuses on three common, but costly, mistakes that IT and security leaders should avoid.

  • Vulnerability Metrics - Which Matter and Which Don't

    Sponsored by: Vulcan

    Metrics enable organizations to share information about cybersecurity risks and demonstrate vulnerabilities – but only if they’re the right metrics. So, how can you delineate between metrics of significance and those that can be ignored? Read on to find out.

  • HOW TO COMBAT Ransomware

    Sponsored by: VMware International Unlimited Company

    Ransomware is a rapidly growing and increasingly disruptive form of malware. In fact, it’s estimated that a ransomware attack strikes every 14 seconds or so. In this edition of Global Threats by VMware Carbon Black, explore and dissect what defines a ransomware attack, how they work, and best practices for mitigating them.

  • Automating Your Vulnerability Remediation Process

    Sponsored by: Vulcan

    The vulnerability management lifecycle is a time-consuming set of tasks, making it a perfect candidate for integrating automation into the process. But how should organizations go about this? This white paper provides a set of examples and uses cases for what to do. Read on to get started.

  • Justify Your Vulnerability Management Program

    Sponsored by: Vulcan

    In this white paper, Vulcan compiled the results from several vulnerability management studies, conducted by organizations like Gartner, Ponemon, Verizon and more, to provide readers with a comprehensive set of key statistics and figures. Read on to unlock the findings.

  • 2019 CrowdStrike Global Security Attitude Survey

    Sponsored by: CrowdStrike

    Each year, CrowdStrike conducts a Global Security Attitude Survey to better understand the current state of incident detection and response. The industry ideal is set at the 1-10-60 rule: 1 minute to detect, 10 minutes to understand, and 60 minutes to contain. Read the research results and see how close organizations came to this benchmark.

  • Implications of MITRE ATT&CK for Security Teams

    Sponsored by: BlueVoyant

    The MITRE ATT&CK framework is a global knowledge hub of observed cyberattack methods and tactics, designed to enable security teams with key insights for detecting and responding to an incident. This e-book offers an overview of the MITRE ATT&CK framework, its history and the implications for security teams. Read on to get started.

  • How to Combat Island Hopping

    Sponsored by: VMware International Unlimited Company

    Island hopping is a cyberattack strategy in which a hacker targets a smaller organization in order to leverage their affiliation with larger organizations as a point of entry for an attack. This white paper takes a closer look at island hopping tactics and methods for identifying and mitigating them. Read on to learn more.

  • Building a High-Speed SOC

    Sponsored by: VMware International Unlimited Company

    87% of organizations today feel it’s difficult to recruit and hire cybersecurity talent. The effects of this skills gap are obvious: security teams will be unable to keep pace with the growing volume of threats. In this white paper, discover how the right balance of skilled workers, processes and technology can produce an effective SOC.

  • Hunt Like a Pro: A Threat Hunting Guide

    Sponsored by: VMware International Unlimited Company

    Threat hunting is a proactive process of scanning the network for potential threats, isolating them and thwarting the malicious behavior before it gets a chance to spread. The goal is to tilt the advantage from the attacker back to the defender. Read this white paper to uncover the best practices necessary to get started hunting threats.

  • VMware Carbon Black Cloud Enterprise EDR

    Sponsored by: VMware International Unlimited Company

    In this datasheet, explore the key features and capabilities of VMware Carbon Black Enterprise EDR, designed to deliver continuous visibility for top security operations centers (SOCs) and incident response (IR) teams as they hunt for threats.

  • VMware Carbon Black Cloud Managed Detection Monitoring and Alert Triage

    Sponsored by: VMware International Unlimited Company

    Today’s security teams are often understaffed and spend too much of their time on tedious, manual tasks. This prevents them from tending to other security areas and slows threat response. In this data sheet, explore VMware Carbon Black Cloud Managed Detection, designed to help by automating some of these tasks. Read on to learn more.

  • Catch intruders in minutes, not months

    Sponsored by: CI Security

    As cyberattacks continue to increase in volume and complexity, organizations are turning to security service providers for managed detection and response (MDR) capabilities. This white paper highlights the key features of Critical Insight Managed Detection & Response (MDR) and provides a breakdown of use cases across several industries.

  • The Right Roles for SIEM and EDR

    Sponsored by: Cybereason

    While most organizations recognize the need for security incident response and threat hunting, many are uncertain how to go about configuring a setup that meets their needs. In this white paper, explore the and benefits of configuring SIEM technologies with new tools like EDR and SOAR.

  • Next-Gen Intrusion Detection: Complementing Perimeter Protection to Secure the Virtual Attack Surface

    Sponsored by: Accedian

    Learn about next-gen IDS technology and how it adds another layer of protection to the enterprise SecOps arsenal to not only protect against illicit network intrusions and behaviors, but to implement active measures to catch cybercriminals in the act.

  • How to Budget for Managed Detection and Response: A 6-step Guide for IT Security

    Sponsored by: CI Security

    As a security leader, one of the biggest challenges is acquiring adequate security tools while staying under budget. Too often, sacrifices are made, leading to potential security gaps. This guide highlights 6 steps you should take when crafting a budget proposal for acquiring a managed detection & response tool Read on to get started.

  • What Makes A Standalone IPS So Effective?

    Sponsored by: Trend Micro

    In this white paper, explore the guiding principles security researchers need to follow when designing and developing effective vulnerability filters, with examples of how these filters can be used by an IPS to detect and block the latest threats.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.