Carbon Black

Displaying 1 - 10 of 26 results

  • Australia Threat Report

    Videos · May 2019 · Provided By Carbon Black

    Carbon Black has just released its latest Australian Threat Report, where they surveyed 250 CISO’s and CIO’s from eight industry sectors in Australia. – The findings highlighted: 89% of Australian businesses have been breached in the last twelve months with over a third of those (34%) saying they have...

    Watch Now
  • A Guide to Replacing Antivirus with Advanced Endpoint Security: McAfee Edition

    White Papers · Feb 2019 · Provided By Carbon Black

    Cyberattackers continue to advance their tools and techniques. IR professionals are now seeing counter-incident response in 51% of attacks, island-hopping in 50%, and another 38% are entering through enterprise IoT devices. Companies need to ensure that their endpoint protection can handle these advanced threats. This is why many McAfee...

    Download Now
  • Threat Hunting For Dummies

    White Papers · Feb 2019 · Provided By Carbon Black

    Introduce the concept of threat hunting and the role it plays in the protection of your organization's systems and information. Many organizations have yet to start a threat hunting program. Understand threat hunting Prepare to hunt and gain the upper hand Become the master hunter

    Download Now
  • Hunt Like a Pro: A Threat Hunting Guide

    White Papers · Feb 2019 · Provided By Carbon Black

    82 percent of companies said they anticipate loss or theft of data resulting from an unsecured internetconnected device or application. Threat hunting is a proactive process that looks for abnormal activity. After years of leading the industry with our endpoint detection and response (EDR) solution, CB Response, Carbon...

    Download Now
  • Cloud Security: From Start Point to End Point

    White Papers · Jan 2019 · Provided By Carbon Black

    Applications are the business in this digital age. Securing the applications that drive your business is essential to providing safe digital experiences to your entire business ecosystem. The WhiteHat Application Security Platform is a cloud service that allows organisations to bridge the gap between security and development to deliver secure...

    Read More
  • Re-designing Linux Security:Do No Harm

    White Papers · Jan 2019 · Provided By Carbon Black

    As businesses become more savvy to the benefits of Linux, we see accelerated adoption of the operating system in the form of both migrations of existing applications and greenfield application deployments. Linux is here, we best secure it. The goals of this whitepaper are to bring light to the flaws...

    Read More
  • Top 5 Threat Hunting Myths

    White Papers · Jan 2019 · Provided By Carbon Black

    The cybersecurity landscape is in a constant state of change and, as many organizations have learned, it’s no longer a matter of if you’ll face a cyberattack, but when. In today’s world, attackers intentionally look normal to evade automated defenses. With the rise of ransomware and fileless attacks, it's harder...

    Read More
  • Cloud Security: From Start Point to End Point Report

    White Papers · Jan 2019 · Provided By Carbon Black

    Applications are the business in this digital age. Securing the applications that drive your business is essential to providing safe digital experiences to your entire business ecosystem. The WhiteHat Application Security Platform is a cloud service that allows organisations to bridge the gap between security and development to deliver secure...

    Download Now
  • Re-designing Linux Security:Do No Harm Report

    White Papers · Jan 2019 · Provided By Carbon Black

    As businesses become more savvy to the benefits of Linux, we see accelerated adoption of the operating system in the form of both migrations of existing applications and greenfield application deployments. Linux is here, we best secure it. The goals of this whitepaper are to bring light to the flaws...

    Download Now
  • Top 5 Threat Hunting Myths Report

    White Papers · Jan 2019 · Provided By Carbon Black

    The cybersecurity landscape is in a constant state of change and, as many organizations have learned, it’s no longer a matter of if you’ll face a cyberattack, but when. In today’s world, attackers intentionally look normal to evade automated defenses. With the rise of ransomware and fileless attacks, it's harder...

    Download Now