All resources sponsored by:

Dell SecureWorks

22 Matches
2018 Incident Response Insights Report
sponsored by Dell SecureWorks
RESEARCH CONTENT:In Secureworks 2018 Security Leaders Survey, 43% of respondents said that regular threat hunting activities were part of their incident response program. Access this 29-page research report to uncover best practices and valuable lessons learned over the past year from real-world incidents.
Posted: 08 Feb 2019 | Published: 08 Feb 2019
Get This Now


Security Maturity: Mapping the Road to Resilience
sponsored by Dell SecureWorks
WHITE PAPER:Download this e-book for a deep dive into risk and cybersecurity actions all organizations should consider as they think through their security strategy.
Posted: 08 Feb 2019 | Published: 08 Feb 2019
Get This Now


Cyber Global Warming Real Life Malscape Insights
sponsored by Dell SecureWorks
WEBCAST:In this webcast, learn how you can measure your cyber-resilience with behavioral intelligence.
Posted: 07 Feb 2019 | Premiered: Oct 2, 2018
Get This Now


How to Reach Cybersecurity Maturity in 5 Critical Steps
sponsored by Dell SecureWorks
WHITE PAPER:Security is often stuck in a defensive and preventive state that leaves organizations unable to detect and respond appropriately to cyberattacks and incidents. In this white paper, find out how you can adjust your organizations security maturity level with just 5 key steps and change the state of your security.
Posted: 07 Feb 2019 | Published: 07 Feb 2019
Get This Now


How Cybercriminals are Adapting to Outwit Defenses
sponsored by Dell SecureWorks
WEBCAST:From July 2017 through June 2018, SecureWorks Counter Threat Unit researchers analyzed incident response outcomes and conducted original research to gain insight into threat activity and behavior across 4,400 companies. In this webcast, gain insight on the key findings from the report.
Posted: 06 Feb 2019 | Premiered: Dec 5, 2018
Get This Now


DIY is DOA: Cybersecurity Moves Toward Hybrid Models
sponsored by Dell SecureWorks
WHITE PAPER:Information security always was complex and challenging. But the rise of cloud and mobile organizations has multiplied that challenge. However, information security services providers (ISSPs) can help organizations by empowering their internal resources. In this white paper, explore how using ISSPs can leverage an organization's operations.
Posted: 06 Feb 2019 | Published: 06 Feb 2019
Get This Now


2018 State of Cybercrime
sponsored by Dell SecureWorks
WHITE PAPER:Find out the deep, dark truth behind the underground hacker economy in the 2018 State of Cybercrime report.
Posted: 05 Feb 2019 | Published: 05 Feb 2019
Get This Now


Eliminating the Blind Spot
sponsored by Dell SecureWorks
WHITE PAPER:Today, enterprises must obtain end-to-end visibility, detection and response capabilities required to quickly remediate breaches. In this white paper, learn how unifying advanced detection technologies for the network and endpoint with the right intelligence, people and processes can empower a security team.
Posted: 05 Feb 2019 | Published: 05 Feb 2019
Get This Now


Threat Intelligence Executive Report
sponsored by Dell SecureWorks
RESEARCH CONTENT:In the last year, the number of sophisticated attacks has increased and threat actors have demonstrated greater adaptability. However, implementing security best practices could limit the impact of many intrusions. In this research report, learn about key developments in the cybercrime threat landscape.
Posted: 04 Feb 2019 | Published: 31 Dec 2018
Get This Now


GDPR: The Race is on for Compliance
sponsored by Dell SecureWorks
EGUIDE:Learn if your organization is ready to ensure its compliance to the GDPR and what you need to know to take it seriously.
Posted: 19 Jun 2017 | Published: 14 Jun 2017
Get This Now


Overcoming Security Breaches and Minimizing the Impact
sponsored by Dell SecureWorks
WHITE PAPER:Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
Posted: 23 May 2013 | Published: 23 May 2013
Get This Now


Five Critical Rules for Firewall Management
sponsored by Dell SecureWorks
WHITE PAPER:This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organisations improve their firewall management.
Posted: 06 Sep 2011 | Published: 06 Sep 2011
Get This Now


Presentation Transcript: Incident Response - Are you prepared?
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT:In this presentation transcript, Lee Lawson, Head of Response Service for Dell SecureWorks EMEA outlines a successful Incident Response approach and best practices for your organisation.
Posted: 30 Aug 2011 | Published: 30 Aug 2011
Get This Now


Presentation Transcript: Malware Reloaded - Mitigating the Next Evolution of Cyber Attacks
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT:View this presentation transcript to explore the evolution of the threat landscape, new behaviours that have been identified, a quantitative analysis of threat intelligence, and inferences, conclusions, and the road ahead.
Posted: 22 Aug 2011 | Published: 22 Aug 2011
Get This Now


Presentation Transcript: Helping to Reduce Compliance Costs for the UK Public Sector
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT:Dell SecureWorks has vast experience in helping customers achieve successful audits against compliance standards. In this presentation trancript, Lee Lawson, Head of Security Testing and Response services with Dell SecureWorks, offers advice on how to maximize your budget.
Posted: 22 Aug 2011 | Published: 22 Aug 2011
Get This Now


Presentation Transcript: The Cybercrime War; When Are We Going to Win?
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT:Why are information security issues so persistent? Why does it feel like we win small battles, yet the war keeps escalating? What does the next 20 years look like? Erik Petersen, Vice President of Security and Risk Consulting at Dell SecureWorks discuss micro and macro-economic theory to grapple with the core questions of “why.”
Posted: 22 Aug 2011 | Published: 22 Aug 2011
Get This Now


Presentation Transcript: Best Practices for Implementation of an Intrusion Prevention and Intrusion Detection Systems
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT:View this presentation transcript to explore the benefits of deploying IPS & IDS, challenges and considerations when implementing IPS & IDS, features to look for when selecting a device, deployment methodologies and more.
Posted: 22 Aug 2011 | Published: 22 Aug 2011
Get This Now


Presentation Transcript: Securing the Virtualized Environment - Keeping the Dream Alive
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT:View this presentation transcript as Neil Anderson, a Principal Consultant from the Infrastructure Protection & Mobility team explores roadblocks of securing virtual environments, common pitfalls, and offers advice on combating these issues.
Posted: 22 Aug 2011 | Published: 22 Aug 2011
Get This Now


Presentation Transcript: Has Your QSA Thrown You Under a Bus?
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT:After working with hundreds of organizations striving to achieve PCI compliance, we understand that one of the biggest challenges is finding and maximizing the use of a quality QSA. This presentation transcript will give you examples of how a bad QSA can derail your PCI program.
Posted: 22 Aug 2011 | Published: 22 Aug 2011
Get This Now


Presentation Transcript: How to Secure Your Mobile Devices
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT:In this presentation transcript, Paul Pearston, a Senior Security Engineer at Dell SecureWorks, discusses the most serious security threats to mobile devices and recommends specific approaches for securing the mobile organization.
Posted: 22 Aug 2011 | Published: 22 Aug 2011
Get This Now


Presentation Transcript: Vulnerability Scanning and Compliance
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT:In this presentation transcript, Lee Lawson, Head of Security Testing and Response at Dell SecureWorks, explores vulnerability scanning drivers, pros and cons for different vulnerability scanning solutions, best fit solutions for specific regulatory compliance standards, and more.
Posted: 22 Aug 2011 | Published: 22 Aug 2011
Get This Now


Presentation Transcript: Go Forth & Comply - New Virtualization Guidelines from the PCI Council
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT:In this presentation transcript, principal security consultant at Dell SecureWorks, discuss the issues confronting organizations who wish to use virtualization technologies with their Cardholder Data Environment, summarize and clarify the recommendations from the PCI council and more.
Posted: 22 Aug 2011 | Published: 22 Aug 2011
Get This Now


22 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement