Five Myths of Agile Development
sponsored by VersionOne Inc.
WHITE PAPER:
In this white paper, you will gain insight into five myths commonly associated with agile development. Explore what agile development is in reality, what it is not, and the true benefits of transitioning to agile methods in your organization.
Posted: 15 Oct 2008 | Published: 26 Sep 2008
|
|
|
Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER:
Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011
|
|
|
The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER:
This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012
|
|
|
The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER:
This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012
|
|
|
Minimizing Cyber Risk with Better Threat Detection and Incident Response
sponsored by TechTarget Security
EZINE:
Today's security incident response must cope with an increasing onslaught of sophisticated attacks. Learn how to automate and collaborate better on your organization's incident response through threat detection, IR tools, and more.
Posted: 16 Nov 2016 | Published: 11 Nov 2016
|
|
|
Incident Response Retainers
sponsored by Novacoast
PRODUCT OVERVIEW:
Download this overview to learn how you can level up your organization’s security incident response management.
Posted: 22 Aug 2023 | Published: 22 Aug 2023
|
|
|
2022 Incident Response Report Webinar
sponsored by Palo Alto Networks
WEBCAST:
Join the Palo Alto and Unit 42 incident response team as they discuss 2022’s common weak security points and offer a 3-step action plan in this webinar.
Posted: 13 Sep 2022 | Premiered: Sep 13, 2022
|
|
|
What to Look for in Incident Response Management Tools
sponsored by TechTarget Security
EBOOK:
Breaches are inevitable, so an effective incident response toolkit is essential. In this buyer's guide, learn the current and upcoming requirements for IR tools and what features are most vital.
Posted: 29 Nov 2016 | Published: 29 Nov 2016
|
|
|
Tips for Expediting Incident Response
sponsored by Threat Track Security
WEBCAST:
This informative resource explores the importance of malware analysis and outlines how to enhance your incident response strategy.
Posted: 02 Jun 2014 | Premiered: Jun 2, 2014
|
|
|
Incident Response Tools: How, When & Why to Use Them
sponsored by Claranet
EGUIDE:
Incident response tools are growing in popularity as an effective method for proactively analyzing and addressing the vulnerabilities within your network. This e-guide was written to help readers through the vetting process as well as understand how, when and why to use them – read on to get started.
Posted: 21 Sep 2020 | Published: 17 Sep 2020
|
|
|
How to Make the Most of your Detection and Response
sponsored by Respond Software
EGUIDE:
Learn from Gartner analyst Anton Chuvakin and Drew Conry-Murray from Packet Pushers, about incident detection and response processes that an organization needs when starting out.
Posted: 23 May 2018 | Published: 18 May 2018
|
|
|
CW APAC - March 2020: Expert Advice: Security Operations Centre
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this handbook, focused on the security operations centre in the Asia-Pacific region, Computer Weekly looks at these challenges, runs through the variety of SOCaaS options available and offers steps to create an effective team.
Posted: 12 Mar 2020 | Published: 19 Mar 2020
|
|
|
Disrupt Targeted Attacks
sponsored by Intel Security
WHITE PAPER:
Incident response teams are overwhelmed with work. Learn best practices for embracing an adaptive security model.
Posted: 21 Sep 2016 | Published: 21 Sep 2016
|
|
|
Incident response playbook in flux as services, tools arrive
sponsored by TechTarget Security
EBOOK:
The enterprise incident response "playbook" is getting a rewrite. An IR playbook guides an enterprise security team's work, identifying triggering events and outlining best practices or regulatory requirements. Download this handbook to learn more about the essential playbook revisions that are putting new technologies and services to use.
Posted: 12 Feb 2019 | Published: 12 Feb 2019
|
|
|
Importance of Incident Response Collaboration
sponsored by Dimension Data
EGUIDE:
This e-guide helps you create a formal incident response plan that allows for effective and efficient collaboration between groups so you can mitigate threats fast. Ensure smooth containment and recovery whenever a breach occurs.
Posted: 22 Sep 2016 | Published: 21 Sep 2016
|
|
|
Incident Response
sponsored by Kaspersky
RESEARCH CONTENT:
A strong, mature cybersecurity posture can help organizations recover from incidents quickly, minimize downtime, contain costs, reduce risks and protect market share; but expertise is needed to get there. Explore new perspectives and best practices on incident response with data-informed research and insights in this report.
Posted: 30 Sep 2023 | Published: 30 Sep 2023
|
|
|
Incident Response
sponsored by Kaspersky
ANALYST REPORT:
A strong, mature cybersecurity posture can help organizations recover from incidents quickly, minimize downtime, contain costs, reduce risks, and protect market share; but expertise is needed to get there. Explore new perspectives and best practices on incident response with data-informed research and insights in this analyst report.
Posted: 23 Jun 2023 | Published: 23 Jun 2023
|
|
|
Presentation Transcript: Incident Response - Are you prepared?
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT:
In this presentation transcript, Lee Lawson, Head of Response Service for Dell SecureWorks EMEA outlines a successful Incident Response approach and best practices for your organisation.
Posted: 30 Aug 2011 | Published: 30 Aug 2011
|
|
|
How to Properly Plan Against Attacks with Incident Response and Advanced Malware Protection
sponsored by TaaSera
EGUIDE:
This expert e-guide explores the dos and don'ts of creating an incident response plan and looks at how advanced malware uses your own network against you.
Posted: 02 Dec 2014 | Published: 02 Dec 2014
|
|
|
Your Guide to Threat Intelligence, AI & Incident Response
sponsored by Dell SecureWorks
EGUIDE:
Organizations must now go beyond automating reactive measures. Cybersecurity now requires infosec professionals to work toward proactive detection to preemptively avoid or thwart threats. In this e-guide, find everything you need to know about threat intelligence platforms, AI in cybersecurity, and incident response planning.
Posted: 27 Mar 2020 | Published: 27 Mar 2020
|
|
|
Who needs security orchestration, automation and response?
sponsored by TechTarget Security
EBOOK:
Who needs SOAR? Only those companies with understaffed, overworked IT security teams. Or in other words; most security teams. Learn how SOAR tools can help ease the burden of required security tasks and free up security pros for more challenging IT security projects.
Posted: 17 Apr 2019 | Published: 17 Apr 2019
|
|
|
All the Ingredients for a Solid Security Incident Response Plan
sponsored by Dell SecureWorks
EGUIDE:
Access this expert e-guide that presents the crucial steps in creating a solid security incident response plan, and the benefits one will bring to your organization.
Posted: 11 Feb 2013 | Published: 11 Feb 2013
|
|
|
Endace Video 3
sponsored by Endace
VIDEO:
Increasingly complex cyberthreats continue to overwhelm security teams, sending many on the hunt for tools that can augment their incident response measures. To help teams do so, Elastic and Endace developed technologies that can accelerate incident response. Watch this video to learn more.
Posted: 23 Mar 2023 | Premiered: 23 Mar 2023
|
|
|
Incident Management The Ultimate Guide For Tech Teams
sponsored by iLert GmbH
EBOOK:
In today's fast-paced digital environment, businesses require adaptable, robust IT systems that can swiftly respond to changing market demands and evolving customer needs. Learn how to embrace an effective incident response strategy with proactive preparation in this ultimate guide to incident management for tech teams.
Posted: 18 Aug 2023 | Published: 18 Aug 2023
|
|
|
Making Modern Networks Bulletproof
sponsored by Reply
LANDING PAGE:
While security measures can be built into the foundation of your network infrastructure, no precaution is perfect, and you still need an incident response team. Access this landing page to learn how Reply leverages networking technologies alongside SIEM and other security tools, in order to provide top-to-bottom security for the network.
Posted: 03 Aug 2023 | Published: 03 Aug 2023
|
|
|
4 Key Incident Response Challenges & How to Overcome Them
sponsored by VMware
WHITE PAPER:
To help security teams navigate the challenging cyberthreat landscape, cybersecurity experts from VMware and Think.Design.Cyber break down 4 common incident response challenges and how to overcome them in this report. Keep reading to access those insights.
Posted: 13 Jul 2023 | Published: 13 Jul 2023
|
|
|
Build Multilayered Defense for the Cloud and Endpoints
sponsored by ConvergeOne
EGUIDE:
Creating a multilayered defense system within a network is necessary for advanced security protection. In this e-guide, security experts Frank Siemons and Ed Tittel discuss intrusion detection and prevention for the cloud and provide key criteria to evaluate endpoint security products for malware protection.
Posted: 14 Mar 2018 | Published: 12 Mar 2018
|
|
|
Countering Cyber-Crime with a Sharp Eye and a Clear Plan
sponsored by TechTarget Security
EBOOK:
Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
Posted: 14 Aug 2014 | Published: 21 Aug 2014
|
|
|
Royal Holloway: Corporate under-reporting of cyber crime
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
Without reporting, cyber crimes cannot be investigated, prosecutions cannot be pursued and effective prevention strategies cannot be developed. Yet despite this, most corporates fail to report cyber crimes. This article in our Royal Holloway security series explains why this is an increasing cause for concern.
Posted: 26 May 2022 | Published: 26 May 2022
|
|