سجل المستندات التعريفية

أحدث الموضوعات:

Leader’s Guide to Defending against Cyber Extortion

Increasing in volume and sophistication, cyber-extortion attacks threaten organizations big and small. To help leaders—CEOs, CIOs, CFOs and more—augment their business’s defenses, this e-book presents a framework that can ensu...

عرض المستندات التعريفية

A CISO’s guide to effective leadership

CISOs are traditionally responsible for securing the organization against malicious threats, but as security becomes more entwined in overall business strategy, the CISO’s role also evolves. This white paper serves as a guide ...

عرض المستندات التعريفية

Readiness, response, and getting back to business after a cyber crisis

When it comes to cybersecurity, there is a thin line separating an incident and a crisis. In essence, every crisis starts out as an incident, and so security teams need to maintain a near-constant state of vigilance. This repo...

عرض المستندات التعريفية

Beating ransomware

Ransomware has come to dominate the current security discourse, appearing ever more frequently in security news reports. Businesses of all sizes and kinds are being held ransom in the modern “double extortion” variant of this i...

عرض المستندات التعريفية

Palo Alto Networks named a Leader by Gartner® for Cortex XDR.

A dynamic and evolving threat landscape requires constant innovation and continued investment in technology to stop threats in near-real time. Palo Alto Networks has delivered on this with Cortex XDR® by providing our customers...

عرض المستندات التعريفية

Enloe Medical Center strengthens its security posture and improves efficiency with Unit 42 Managed Detection and Response (MDR)

For medical facilities, cybersecurity is critical for protecting access to patient records and networked medical devices. At the time of the attack, Enloe’s Cybersecurity team had a variety of tools in place and was getting inf...

عرض دراسة الحالة

Your Roadmap to a Unified Security Approach

By year-end 2028, XDR will be deployed in 30% of end-user organizations to reduce the number of security vendors they have in place, up from less than 5% today.1 Extended detection and response is an evolving technology that p...

عرض التقرير

XDR For Dummies

Download this e-book to get up to speed on everything XDR. You’ll become well-versed in all things XDR, including key points such as: The current state of detection and response What XDR is and isn’t 10 must-have XDR capabilit...

عرض المستندات التعريفية

Why Ransomware Isn’t Going Anywhere Anytime Soon

Ransomware attacks have continued to dominate headlines, and they’re constantly becoming more sophisticated. How has ransomware evolved since it was first recognized around 2005? Who is now more vulnerable to these attacks? Wh...

عرض التقرير

A Comprehensive Guide to the 2023 MITRE Engenuity ATT&CK Evaluations

In the latest round of MITRE Engenuity ATT&CK® evaluations, 29 industry-leading vendors faced off against the sophisticated tactics, techniques and procedures of the Russian-based threat group Turla. The MITRE ATT&CK Ev...

عرض المستندات التعريفية
سجل في نشرتنا الإخبارية
تلقى أهم الأخبار عبر البريد الإلكتروني مجانًا