Five Myths of Agile Development
sponsored by VersionOne Inc.
WHITE PAPER:
In this white paper, you will gain insight into five myths commonly associated with agile development. Explore what agile development is in reality, what it is not, and the true benefits of transitioning to agile methods in your organization.
Posted: 15 Oct 2008 | Published: 26 Sep 2008
|
|
|
What is Incident Response? Plans, Teams and Tools
sponsored by AT&T Corp
EGUIDE:
Many experts use the terms incident response and incident management interchangeably, but the two are hardly the same. So, what is incident response? And what are the essential elements you need to know for protecting your organization? Read this e-guide to find out.
Posted: 18 Sep 2023 | Published: 29 Feb 2024
|
|
|
CW APAC - March 2020: Expert Advice: Security Operations Centre
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this handbook, focused on the security operations centre in the Asia-Pacific region, Computer Weekly looks at these challenges, runs through the variety of SOCaaS options available and offers steps to create an effective team.
Posted: 08 Feb 2021 | Published: 19 Mar 2020
|
|
|
Endace Video 3
sponsored by Endace
VIDEO:
Increasingly complex cyberthreats continue to overwhelm security teams, sending many on the hunt for tools that can augment their incident response measures. To help teams do so, Elastic and Endace developed technologies that can accelerate incident response. Watch this video to learn more.
Posted: 23 Mar 2023 | Premiered: 23 Mar 2023
|
|
|
Ultimate Guide to Incident Response and Management
sponsored by Bottomline Technologies, Inc.
EGUIDE:
Incident response (IR) planning should be your top priority to minimize any security vulnerabilities that will allow hackers to invade your network. Take the survey to access the Ultimate Guide to Incident Response and Management.
Posted: 10 Dec 2021 | Published: 28 Oct 2021
|
All resources sponsored by Bottomline Technologies, Inc.
|
|
Royal Holloway: Corporate under-reporting of cyber crime
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
Without reporting, cyber crimes cannot be investigated, prosecutions cannot be pursued and effective prevention strategies cannot be developed. Yet despite this, most corporates fail to report cyber crimes. This article in our Royal Holloway security series explains why this is an increasing cause for concern.
Posted: 26 May 2022 | Published: 26 May 2022
|
|
|
Richmond Advisory Group Incident Readiness Response
sponsored by AT&T and LevelBlue
RESEARCH CONTENT:
To understand why mid-market organizations and SMEs purchase incident readiness and response services, The Richmond Advisory Group surveyed 500 cybersecurity decision-makers. Review the survey’s findings in this 2024 report, “Why Mid-market Organizations Are Prioritizing Incident Readiness and Response in the Face of Regulatory Scrutiny.”
Posted: 07 Jun 2024 | Published: 07 Jun 2024
|
|
|
Incident Response Report 2024
sponsored by Palo Alto Networks
ANALYST REPORT:
This comprehensive incident response report analyzes the latest attack tactics, including the rise of AI-enabled social engineering and the threat of encrypted data stockpiles. Learn how to strengthen your security posture and accelerate your response to cyberthreats. Read the full report now.
Posted: 08 Nov 2024 | Published: 08 Nov 2024
|
|
|
Application Detection and Response (ADR): Helping SecOps teams address NIST CSF
sponsored by Contrast Security
INFOGRAPHIC:
This infographic explores how Application Detection and Response (ADR) can help security operations centers (SOCs) address the NIST Cybersecurity Framework, extending visibility into the application and API layer to identify and mitigate threats. Read the full infographic to learn more.
Posted: 14 Nov 2024 | Published: 15 Nov 2024
|
|
|
Automated And Accelerated Incident Response With Cortex Xsoar And Network History
sponsored by Endace
WHITE PAPER:
Security alert overload: Are you and your security team living in this state? If so, then you know that it’s exhausting—but you may not know the cause of it. One common cause of alert overload is the lack of integration of various security tools. Read this white paper to access guidance for overcoming that challenge.
Posted: 13 Mar 2023 | Published: 14 Mar 2023
|
|
|
The State Of Incident Management Report 2024
sponsored by Atlassian
EBOOK:
This comprehensive report benchmarks the state of incident management in 2024, covering topics like communication, tooling, AI, and areas for improvement. Discover how leading organizations are managing incidents more proactively and efficiently. Read the full White Paper to learn industry insights and best practices.
Posted: 18 Oct 2024 | Published: 18 Oct 2024
|
|
|
Automate Security Operations with the Multilayered Fortinet Automated SOC Solution
sponsored by Fortinet, Inc.
PRODUCT OVERVIEW:
Comprehensive report on automating security to tackle complex threats. Highlights Fortinet's automated solutions and urges leaders to use AI, centralized platforms, and services to ease SOC team burdens. Advocates for adaptable automation to bridge capability gaps, enhance detection, quicken response, and prevent alert fatigue.
Posted: 16 Mar 2024 | Published: 16 Mar 2024
|
|
|
Power Greater Visibility, More Productivity, and Faster Responses with EDR, NDR, and NGFW Integration
sponsored by Fortinet, Inc.
WHITE PAPER:
Integrating endpoint detection and response (EDR), network detection and response (NDR), and next-generation firewall (NGFW) technologies can provide security teams with greater visibility, productivity, and faster incident response. Download this white paper to learn how this combined approach can enhance your security operations.
Posted: 07 Oct 2024 | Published: 08 Oct 2024
|
|
|
How iFood tracks and resolves major incidents faster
sponsored by Atlassian
WEBCAST:
iFood is a leading food delivery company, delivering 75 million orders a month in Brazil. To handle this demand, iFood needed to improve its incident management process, which was slow and manual. In this webinar, learn how iFood used Jira Service Management to transform their operations.
Posted: 23 Sep 2024 | Premiered: Aug 16, 2024
|
|
|
Royal Holloway: Purple team playbook – threat modeling for security testing
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
The reality of information security is that it is impossible to completely ensure that an attacker cannot get into the corporate network. Instead, companies should look at how they prepare and react to security attacks by gaining an understanding of how cyber criminals work by combining the talents of red teams and blue teams
Posted: 08 Feb 2021 | Published: 15 Jul 2020
|
|
|
The Power of Native Cloud Detection and Response Services
sponsored by AWS & Elastic
ESG SHOWCASE:
As cloud infrastructure and apps evolve rapidly, security teams struggle to maintain visibility and response capabilities. This Enterprise Strategy Group Showcase explores native AWS detection and response services that can help close critical cloud security gaps, enabling earlier threat detection and faster mitigation. Read on now to learn more.
Posted: 23 Oct 2024 | Published: 23 Oct 2024
|
|
|
Integrated Alerts, Logs, And Network History For Rapid And Accurate Incident Response
sponsored by Endace
PRODUCT OVERVIEW:
Today’s cyber landscape brims with threats. Therefore, your organization’s incident response has to be rapid. This overview explores how your business can resolve security incidents up to 20 times faster by leveraging Corelight and Endace solutions. Continue on to learn more.
Posted: 28 Mar 2023 | Published: 28 Mar 2023
|
|
|
EndaceProbe Analytics Platform and Cisco Stealthwatch
sponsored by Endace
PRODUCT OVERVIEW:
When a threat enters your network, you need to investigate it quickly. Endace and Cisco have teamed up to help you do so. Read this overview to learn how you can enhance your incident response by integrating EndaceProbe’s network packet history with Cisco Stealthwatch.
Posted: 25 Mar 2023 | Published: 25 Mar 2023
|
|
|
Computer Weekly – 13 September 2022: Source responsibly: Tech sector efforts to root out forced labour are failing
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we analyse the technology industry's failure to extirpate forced labour and slavery from its supply chains. We find out how cyber security firm Okta is rebuilding customer trust after a major security incident. And we discover how Caterpillar is modernising its data management. Read the issue now.
Posted: 09 Sep 2022 | Published: 13 Sep 2022
|
|
|
Evaluating the Pillars of Responsible AI
sponsored by Hitachi Pentaho
ESG RESEARCH REPORT:
As AI's role expands, responsible AI practices become increasingly crucial. This Enterprise Strategy Group research report covers key pillars like bias, fairness, and transparency, and how to align innovation with ethical AI development. Read on now to learn how you can build an effective, responsible AI strategy for your organization.
Posted: 08 Aug 2024 | Published: 08 Aug 2024
|
|
|
Sensible one-page thoughts on managing performance
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Ludo Houdenaert distils a lifetime of experience on managing performance in the IT department into this collection of short, digestible articles, written especially for Computer Weekly.
Posted: 08 Feb 2021 | Published: 28 Sep 2016
|
|
|
African + Eastern Deploys Comprehensive Security Program with Secureworks
sponsored by SecureWorks
CASE STUDY:
Middle East beverage distributor African + Eastern deploys comprehensive security program with Secureworks, gaining 24/7 threat monitoring, detection, and response to reduce organizational risk. Read the full case study to learn how Secureworks' managed detection and response solution helped secure their digital environment.
Posted: 14 Nov 2024 | Published: 14 Nov 2024
|
|
|
The Hidden Costs of Aging Endpoint Solutions
sponsored by Fortinet, Inc.
WHITE PAPER:
Existing security teams are overwhelmed due to the proliferation of threat alerts and associated false positives. Solutions like EDR and especially XDR deliver security incident detection and automated response capabilities for your security infrastructure. Read on in this white paper now to learn more.
Posted: 21 Aug 2024 | Published: 01 Apr 2024
|
|
|
NetSecOps: Examining How Network And Security Teams Collaborate For A Better Digital Future
sponsored by Endace
ANALYST REPORT:
Network teams and security teams: Both are key to successful IT. But how can the teams collaborate successfully, and why is that often a challenge? For insights, review this 2024 EMA Research Report.
Posted: 23 Feb 2024 | Published: 24 Feb 2024
|
|
|
Software Security is a Team Sport
sponsored by Veracode
WHITE PAPER:
Software security requires collaboration across security, development, and operations teams. Learn best practices for integrating security into the software development lifecycle, measuring success, and becoming an elite organization. Read the full white paper to discover how to build a culture of security.
Posted: 16 Sep 2024 | Published: 16 Sep 2024
|
|
|
ITOps & service management: The state of play in APAC
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide on ITSM in APAC, find out how to keep IT operations running to empower a remote workforce, the advantages of cloud-based service management tools and how one Australian company is managing IT incidents amid a shorter development lifecycle.
Posted: 08 Feb 2021 | Published: 22 Jul 2020
|
|