Solution Spotlight: Creating a Strong Customer Experience Management Strategy
sponsored by TechTarget Customer Experience
EGUIDE:
In this e-guide, learn how to resolve communication issues between the IT and contact center departments by creating internal service-level agreements, recognizing that what's right for the organization is the same as what's right for the customer, and more.
Posted: 05 Dec 2012 | Published: 05 Dec 2012
|
|
|
Infographic: Who needs to be on your digital transformation team?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022
|
|
|
Five Myths of Agile Development
sponsored by VersionOne Inc.
WHITE PAPER:
In this white paper, you will gain insight into five myths commonly associated with agile development. Explore what agile development is in reality, what it is not, and the true benefits of transitioning to agile methods in your organization.
Posted: 15 Oct 2008 | Published: 26 Sep 2008
|
|
|
Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER:
Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011
|
|
|
The Changing Role of the CIO
sponsored by Hewlett-Packard Enterprise
PRESENTATION TRANSCRIPT:
This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 28 Nov 2012 | Published: 28 Nov 2012
|
|
|
Transcript: The Changing Role of the CIO
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT:
This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 02 Apr 2013 | Published: 02 Apr 2013
|
|
|
The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER:
This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012
|
|
|
The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER:
This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012
|
|
|
Minimizing Cyber Risk with Better Threat Detection and Incident Response
sponsored by TechTarget Security
EZINE:
Today's security incident response must cope with an increasing onslaught of sophisticated attacks. Learn how to automate and collaborate better on your organization's incident response through threat detection, IR tools, and more.
Posted: 16 Nov 2016 | Published: 11 Nov 2016
|
|
|
Incident Response Retainers
sponsored by Novacoast
PRODUCT OVERVIEW:
Download this overview to learn how you can level up your organization’s security incident response management.
Posted: 22 Aug 2023 | Published: 22 Aug 2023
|
|
|
What to Look for in Incident Response Management Tools
sponsored by TechTarget Security
EBOOK:
Breaches are inevitable, so an effective incident response toolkit is essential. In this buyer's guide, learn the current and upcoming requirements for IR tools and what features are most vital.
Posted: 29 Nov 2016 | Published: 29 Nov 2016
|
|
|
Tips for Expediting Incident Response
sponsored by Threat Track Security
WEBCAST:
This informative resource explores the importance of malware analysis and outlines how to enhance your incident response strategy.
Posted: 02 Jun 2014 | Premiered: Jun 2, 2014
|
|
|
Incident Response Tools: How, When & Why to Use Them
sponsored by Claranet
EGUIDE:
Incident response tools are growing in popularity as an effective method for proactively analyzing and addressing the vulnerabilities within your network. This e-guide was written to help readers through the vetting process as well as understand how, when and why to use them – read on to get started.
Posted: 21 Sep 2020 | Published: 17 Sep 2020
|
|
|
How to Make the Most of your Detection and Response
sponsored by Respond Software
EGUIDE:
Learn from Gartner analyst Anton Chuvakin and Drew Conry-Murray from Packet Pushers, about incident detection and response processes that an organization needs when starting out.
Posted: 23 May 2018 | Published: 18 May 2018
|
|
|
CW APAC - March 2020: Expert Advice: Security Operations Centre
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this handbook, focused on the security operations centre in the Asia-Pacific region, Computer Weekly looks at these challenges, runs through the variety of SOCaaS options available and offers steps to create an effective team.
Posted: 12 Mar 2020 | Published: 19 Mar 2020
|
|
|
Disrupt Targeted Attacks
sponsored by Intel Security
WHITE PAPER:
Incident response teams are overwhelmed with work. Learn best practices for embracing an adaptive security model.
Posted: 21 Sep 2016 | Published: 21 Sep 2016
|
|
|
Incident response playbook in flux as services, tools arrive
sponsored by TechTarget Security
EBOOK:
The enterprise incident response "playbook" is getting a rewrite. An IR playbook guides an enterprise security team's work, identifying triggering events and outlining best practices or regulatory requirements. Download this handbook to learn more about the essential playbook revisions that are putting new technologies and services to use.
Posted: 12 Feb 2019 | Published: 12 Feb 2019
|
|
|
Importance of Incident Response Collaboration
sponsored by Dimension Data
EGUIDE:
This e-guide helps you create a formal incident response plan that allows for effective and efficient collaboration between groups so you can mitigate threats fast. Ensure smooth containment and recovery whenever a breach occurs.
Posted: 22 Sep 2016 | Published: 21 Sep 2016
|
|
|
Incident Response
sponsored by Kaspersky
ANALYST REPORT:
A strong, mature cybersecurity posture can help organizations recover from incidents quickly, minimize downtime, contain costs, reduce risks, and protect market share; but expertise is needed to get there. Explore new perspectives and best practices on incident response with data-informed research and insights in this analyst report.
Posted: 23 Jun 2023 | Published: 23 Jun 2023
|
|
|
Presentation Transcript: Incident Response - Are you prepared?
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT:
In this presentation transcript, Lee Lawson, Head of Response Service for Dell SecureWorks EMEA outlines a successful Incident Response approach and best practices for your organisation.
Posted: 30 Aug 2011 | Published: 30 Aug 2011
|
|
|
The State of Security Automation
sponsored by Palo Alto Networks
ANALYST REPORT:
According to a 2021 Palo Alto Networks report, respondent report that the 3 highest volume incident types were phishing alerts (74%), malware alerts (56%) and endpoint security alerts (53%). Download this comprehensive report to learn how you can approach security automation.
Posted: 03 Feb 2022 | Published: 03 Feb 2022
|
|
|
How to Properly Plan Against Attacks with Incident Response and Advanced Malware Protection
sponsored by TaaSera
EGUIDE:
This expert e-guide explores the dos and don'ts of creating an incident response plan and looks at how advanced malware uses your own network against you.
Posted: 02 Dec 2014 | Published: 02 Dec 2014
|
|
|
Your Guide to Threat Intelligence, AI & Incident Response
sponsored by Dell SecureWorks
EGUIDE:
Organizations must now go beyond automating reactive measures. Cybersecurity now requires infosec professionals to work toward proactive detection to preemptively avoid or thwart threats. In this e-guide, find everything you need to know about threat intelligence platforms, AI in cybersecurity, and incident response planning.
Posted: 27 Mar 2020 | Published: 27 Mar 2020
|
|
|
Who needs security orchestration, automation and response?
sponsored by TechTarget Security
EBOOK:
Who needs SOAR? Only those companies with understaffed, overworked IT security teams. Or in other words; most security teams. Learn how SOAR tools can help ease the burden of required security tasks and free up security pros for more challenging IT security projects.
Posted: 17 Apr 2019 | Published: 17 Apr 2019
|
|
|
All the Ingredients for a Solid Security Incident Response Plan
sponsored by Dell SecureWorks
EGUIDE:
Access this expert e-guide that presents the crucial steps in creating a solid security incident response plan, and the benefits one will bring to your organization.
Posted: 11 Feb 2013 | Published: 11 Feb 2013
|
|
|
Endace Video 3
sponsored by Endace
VIDEO:
Increasingly complex cyberthreats continue to overwhelm security teams, sending many on the hunt for tools that can augment their incident response measures. To help teams do so, Elastic and Endace developed technologies that can accelerate incident response. Watch this video to learn more.
Posted: 23 Mar 2023 | Premiered: 23 Mar 2023
|
|
|
Incident Management The Ultimate Guide For Tech Teams
sponsored by iLert GmbH
EBOOK:
In today's fast-paced digital environment, businesses require adaptable, robust IT systems that can swiftly respond to changing market demands and evolving customer needs. Learn how to embrace an effective incident response strategy with proactive preparation in this ultimate guide to incident management for tech teams.
Posted: 18 Aug 2023 | Published: 18 Aug 2023
|
|
|
Making Modern Networks Bulletproof
sponsored by Reply
LANDING PAGE:
While security measures can be built into the foundation of your network infrastructure, no precaution is perfect, and you still need an incident response team. Access this landing page to learn how Reply leverages networking technologies alongside SIEM and other security tools, in order to provide top-to-bottom security for the network.
Posted: 03 Aug 2023 | Published: 03 Aug 2023
|
|
|
4 Key Incident Response Challenges & How to Overcome Them
sponsored by VMware
WHITE PAPER:
To help security teams navigate the challenging cyberthreat landscape, cybersecurity experts from VMware and Think.Design.Cyber break down 4 common incident response challenges and how to overcome them in this report. Keep reading to access those insights.
Posted: 13 Jul 2023 | Published: 13 Jul 2023
|
|
|
Build Multilayered Defense for the Cloud and Endpoints
sponsored by ConvergeOne
EGUIDE:
Creating a multilayered defense system within a network is necessary for advanced security protection. In this e-guide, security experts Frank Siemons and Ed Tittel discuss intrusion detection and prevention for the cloud and provide key criteria to evaluate endpoint security products for malware protection.
Posted: 14 Mar 2018 | Published: 12 Mar 2018
|
|
|
Countering Cyber-Crime with a Sharp Eye and a Clear Plan
sponsored by TechTarget Security
EBOOK:
Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
Posted: 14 Aug 2014 | Published: 21 Aug 2014
|
|
|
Royal Holloway: Corporate under-reporting of cyber crime
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
Without reporting, cyber crimes cannot be investigated, prosecutions cannot be pursued and effective prevention strategies cannot be developed. Yet despite this, most corporates fail to report cyber crimes. This article in our Royal Holloway security series explains why this is an increasing cause for concern.
Posted: 26 May 2022 | Published: 26 May 2022
|
|
|
Ultimate Guide to Incident Response and Management
sponsored by Bottomline Technologies, Inc.
EGUIDE:
Incident response (IR) planning should be your top priority to minimize any security vulnerabilities that will allow hackers to invade your network. Take the survey to access the Ultimate Guide to Incident Response and Management.
Posted: 10 Dec 2021 | Published: 28 Oct 2021
|
All resources sponsored by Bottomline Technologies, Inc.
|