All Research Sponsored By:Lumen

Revolutionising cybersecurity for tomorrow’s threats
WHITE PAPER: Cyber threats are rapidly evolving, requiring a proactive, holistic approach to cybersecurity. Read this white paper to learn how Lumen's Advanced Managed Detection and Response (AMDR) solution combines asset visibility, continuous vulnerability management, and threat hunting to build a resilient security posture.
Posted: 30 Sep 2024 | Published: 30 Sep 2024


End-to-End Supply Chain Risk Management: Implementing Effective Strategies
BLOG: This article can provide you with insight into effective strategies to manage end-to-end supply chain risks and how to identify and remediate third-party vulnerabilities. Additionally, you can discover how to enforce encryption practices, and implement a robust incident response plan. Read the full article to learn more.
Posted: 09 Sep 2024 | Published: 17 Sep 2024


Lumen Technologies Helps Enterprises See More, Stop More – Achieving Business Resilience Through A Proactive Cybersecurity Approach
BLOG: Lumen Technologies expands its Advanced Managed Detection and Response (MDR) service to help enterprises proactively secure their digital infrastructure. Read the white paper to learn how Lumen's comprehensive MDR offerings can enhance your cybersecurity posture and resilience.
Posted: 09 Sep 2024 | Published: 17 Sep 2024


What are the cybersecurity hot takes for 2024?
BLOG: Explore the emerging cybersecurity trends for 2024, including ransomware, zero trust, and cloud security. Read this blog to discover more and learn how your organization can stay ahead of the evolving threat landscape.
Posted: 09 Sep 2024 | Published: 16 Sep 2024


How do organisations in Asia Pacific tackle vulnerability management?
BLOG: Discover how organizations in Asia Pacific tackle vulnerability management. This article explores the critical steps for effective vulnerability identification, prioritization, resolution, and reporting. Read the article to learn how to enhance your security posture and minimize cyber risks.
Posted: 09 Sep 2024 | Published: 16 Sep 2024


Are there Invisible Threats lurking within your systems?
WHITE PAPER: Insider threats, whether malicious or accidental, exploit authorized access to steal data or cause disruption. User Entity and Behavioral Analytics (UEBA) uses machine learning to detect anomalies and identify potential security threats before they escalate. Learn how UEBA can neutralize the "Dark Passenger" - read the full white paper.
Posted: 09 Sep 2024 | Published: 16 Sep 2024


Stay ahead of the curve by investing in cybersecurity
BLOG: Cybersecurity skills are critical for organizations in Asia Pacific to stay ahead of evolving threats. Learn how to build internal capabilities, leverage AI, and partner with a managed security service provider to enhance your security posture. Read the full white paper.
Posted: 09 Sep 2024 | Published: 16 Sep 2024


MDR vs IR: Taking the best approach for your organisation
BLOG: Explore the differences between Managed Detection and Response (MDR) and Incident Response (IR) to determine the best approach for your organization. Learn how MDR's proactive threat hunting and 24/7 monitoring can enhance security, while IR provides a blueprint for responding to cyber threats. Read the full Buyer's Guide to decide.
Posted: 09 Sep 2024 | Published: 12 Sep 2024