Security Software Research
-
MicroScope – May 2022: Charging at SME security challenges
Sponsored by: MicroScopeWith cyber threats growing, SMEs have to improve their security position, and the channel is best placed to support that aim. Read all about improving security, how sustainability is more important than ever in channel conversations, and the impact of hybrid working
-
MITRE ATT&CK: Climb to the top
Sponsored by: ComputerWeekly.comThe purpose of this article is to explain what the MITRE ATT&CK framework is and how it has become the de-facto industry standard for describing cyber adversarial behaviour. It will illustrate why it was created, why it can be considered a burgeoning cyber security ontology, and how it ended up being the one of the most widespread frameworks.
-
Transforming risk Why digital transformation depends on integrated risk management
Sponsored by: ServiceNowEmbarking on a digital transformation without considering risk management is like doing a massive home remodel on top of a crumbling foundation – which is why IT and non-IT leaders are embracing integrated risk management (IRM) as part of their transformation. Read this e-book to learn more about IRM and it’s role in digital transformation.
-
All together now
Sponsored by: ServiceNow2020 has been a disastrous and disruptive year for organizations and their security programs. Upticks in cyberattacks – like malware – have led to significant and costly breaches. Read this white paper to learn more about the effects of 2020 and how IT and security teams can collaborate to drive operational resilience against today’s threats.
-
Infographic: SIEM vs. SOAR vs. XDR
Sponsored by: ComputerWeekly.comIT security teams face an ongoing challenge: how best to collect data and turn it into intelligence to stop cyber threats. To help out, vendors have released generations of products that aggregate and analyse security events. In this infographic, learn the differences between SIEM, SOAR and XDR, and how these tools can help improve cyber security.
-
Top 10 cyber security stories of 2021
Sponsored by: ComputerWeekly.comCyber security was once again top of the agenda for IT leaders in 2021, with a barrage of news and analysis making it hard to separate the wheat from the chaff and the genuine insight from the self-promotional nonsense. However, there were some stand-out cyber security stories in the past 12 months that were indubitably worthy of attention.
-
MicroScope – January 2022: Squaring up to ransomware
Sponsored by: MicroScopeIn this issue, discover how to best fend off the ever-increasing threat of ransomware, learn what the next stage of the data warehouse could be, and find out what leading channel experts believe awaits the industry in the year ahead
-
The Radicati Group, Inc. Endpoint Security - Market Quadrant 2020 *
Sponsored by: BitdefenderEndpoint security has become a top priority in 2020 – but threats are always evolving, so it’s critical to ensure endpoints are protected with the best-in-class defenses. Read this research report from The Radicati Group for an overview of the key trends, risks and top offerings as they relate to the endpoint security market.
-
The SIEM Buyer's Guide for 2021
Sponsored by: SplunkSIEM has become a core component of modern cybersecurity programs – enabling organizations to detect and act on threats before they strike. The following SIEM buyer’s guide provides a deep dive into the evolution of SIEM, its essential features, key capabilities and what the 2021 SIEM landscape looks like – read on to get started.
-
The Definitive Email Security Strategy Guide: A People-Centric Approach to Stopping Malware, Phishing, and Email Fraud
Sponsored by: ProofpointWith 94% of external cyber threats start with email, organizations need to ensure that their email security strategy can keep pace with this growing threat landscape. This white paper explores a new, people-centric approach to email security and provides you with a comprehensive guide for implementing this approach (including a checklist).
-
Cyber Security: 2021 Worst in Show
Sponsored by: ComputerWeekly.comIn this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
-
Security Think Tank Pt.2 - 2020 bought us universal remote working. So what next?...
Sponsored by: ComputerWeekly.comIn this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
-
SIEM, SOAR or both? Our security experts weigh in
Sponsored by: ComputerWeekly.comIn this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
-
Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
Sponsored by: ComputerWeekly.comIn this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
-
Cyber Security: 2021 Worst in Show
Sponsored by: ComputerWeekly.comIn this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
-
Why are Acronis Cyber Protection Solutions Threatagnostic?
Sponsored by: AcronisSecurity professionals must both account for the many types of cyberattacks and apply security controls to different vectors through which these attacks can make their way in. In this white paper, read up on threat vectors, cyberattack techniques, types of malware and fileless attacks, and see how Acronis can help you fight them all.
-
The Ultimate Guide: What Is CSPM? And How To Select One
Sponsored by: HorangiGartner predicts that through 2024, organizations implementing a Cloud Security Posture Management (CSPM) could reduce cloud-related incidents due to misconfiguration by upwards of 80%. But what exactly is CSPM, and how should you approach CSPM adoption? Read this e-guide to find out.
-
Royal Holloway: Testing antivirus efficacy in Linux
Sponsored by: ComputerWeekly.comAntivirus software plays an important part in protecting users and networks from malware, so installing and keeping it up-to-date is essential in securing computing devices. Yet Linux users believe this OS can only be marginally affected by malicious software. In this Royal Holloway article, we evaluate the effectiveness of some antivirus products.
-
7 Experts on Transitioning to MDR
Sponsored by: GoSecureManaged detection and response (MDR) can help you quickly identify and mitigate cyberattacks. But it’s not always clear when a company should move to MDR, nor is it clear how to get the greatest value from an MDR service. In this e-book, hear from 7 security experts as they offer advice to organizations considering MDR.
-
Integrated Cybersecurity Delivers Efficiency and Effectiveness in a Challenging Environment
Sponsored by: KasperskyAccording to IDC research, the majority (75%) of organizations worldwide recognize that security team's time is wasted due to a lack of integration in their security environments. These teams would be wise to consider a multi-level, integrated approach with endpoint protection in mind. See this IDC white paper to examine such an approach.
-
Security White Paper Data Security Is Serious Business.
Sponsored by: AlchemerThe digital landscape is constantly evolving – which necessitates changes and improvements to security tactics and controls. This white paper highlights the key tenets and capabilities of Alchemer’s information security program – read on to enhance your understanding.
-
Case Study: Archdiocese
Sponsored by: BitdefenderThe Archdiocese isn’t typically renowned for their IT and cybersecurity skills. However, in this case study, they partnered with Bitdefender to integrate MDR capabilities as part of a project to consolidate time spent on security operations and enable their IT staff to focus on strategic initiatives. Read on to unlock the full story.
-
The Total Economic Impact™ Of ServiceNow Risk And Compliance
Sponsored by: ServiceNowDownload this Forrester Total Economic Impact Report for exclusive insight into the efficiencies and advancements in governance, risk and compliance (GRC), vendor risk management (VRM) and business continuity management (BCM) with ServiceNow Risk and Compliance – as well as an analysis of costs.
-
The Impact of XDR in the Modern SOC
Sponsored by: Dell SecureWorksExtended detection and response (XDR) is gaining momentum in the security arena. ESG recently surveyed IT/InfoSec professionals across multiple industry verticals to better understand the market perception of XDR, as well as value points and challenges that come with it. Access the full ESG report to see the impact of XDR in the modern SOC.
-
SonicWall Secure SD-Branch
Sponsored by: SonicWallBranch networks are quickly evolving. Secure SD-Branch can provide security, network segmentation and compliance for peace of mind on distributed networks. SonicWall Secure SD-Branch aims to simplify deployment, management and troubleshooting. Access this solution brief to explore potential benefits.