Carbon Black

Displaying 1 - 10 of 32 results

  • Cognitions of a Cybercriminal

    White Papers · Aug 2019 · Provided By Carbon Black

    With the rising volume of cyberattacks and the increase in non-malware techniques, CISOs need to evolve their defenses. This means obtaining better visibility into cybercriminal behavior, and the place to start is with a clear understanding of how today’s cybercriminals think as they execute an attack on a targeted organization....

    Download Now
  • Finance Access Mining Report

    White Papers · Aug 2019 · Provided By Carbon Black

    Carbon Black’s (CB) Threat Analysis Unit (TAU) has uncovered a secondary component in a well-known cryptomining campaign. The malware has been enhanced to also steal system access information for possible sale on the dark web. Combined together, this attack is being classified as “Access Mining.” This discovery indicates a bigger...

    Download Now
  • Gartner: Top 10 Security Projects for 2019

    White Papers · Jul 2019 · Provided By Carbon Black

    If you are struggling with balancing and prioritizing investments across technology, people and processes, and need guidance in prioritizing security projects that can make the most impact in reducing organization risk, Gartner has created a guide to aid your company.

    Find Out More
  • Building the Business Case for Improving Endpoint Security

    White Papers · Jul 2019 · Provided By Carbon Black

    Convincing your boss to invest in upgrading security can be tough. Providing trusted sources that demonstrate value to your business and a clear ROI is key. This paper aims to help you do just that build a solid case for investing in advanced endpoint security. We've done the work...

    Let's Start
  • The Ultimate Cybersecurity Guide for the IT Professional

    Ebooks · Jul 2019 · Provided By Carbon Black

    This guide is an introduction to the world of cybersecurity—it’s history, language and resources—so you can further educate yourself on this rapidly evolving area of IT. With over 150 sourced references, this guide is sure to get you connected with both knowledge and the cybersecurity community. Whether you are...

    View This Now
  • Getting More From Less: Simplifying Endpoint Security with a Cloud Delivered Platform

    White Papers · Jun 2019 · Provided By Carbon Black

    IT and security professionals know that the threat landscape is dynamic. Every day, attackers are getting smarter and coming up with new techniques to avoid detection. With non-malware and in-memory attacks now making up 70% of breaches, traditional antivirus (AV) is no longer enough to keep systems safe. In fact,...

    Download Now
  • Australia Threat Report

    Videos · May 2019 · Provided By Carbon Black

    Carbon Black has just released its latest Australian Threat Report, where they surveyed 250 CISO’s and CIO’s from eight industry sectors in Australia. – The findings highlighted: 89% of Australian businesses have been breached in the last twelve months with over a third of those (34%) saying they have...

    Watch Now
  • A Guide to Replacing Antivirus with Advanced Endpoint Security: McAfee Edition

    White Papers · Feb 2019 · Provided By Carbon Black

    Cyberattackers continue to advance their tools and techniques. IR professionals are now seeing counter-incident response in 51% of attacks, island-hopping in 50%, and another 38% are entering through enterprise IoT devices. Companies need to ensure that their endpoint protection can handle these advanced threats. This is why many McAfee...

    Download Now
  • Threat Hunting For Dummies

    White Papers · Feb 2019 · Provided By Carbon Black

    Introduce the concept of threat hunting and the role it plays in the protection of your organization's systems and information. Many organizations have yet to start a threat hunting program. Understand threat hunting Prepare to hunt and gain the upper hand Become the master hunter

    Download Now
  • Hunt Like a Pro: A Threat Hunting Guide

    White Papers · Feb 2019 · Provided By Carbon Black

    82 percent of companies said they anticipate loss or theft of data resulting from an unsecured internetconnected device or application. Threat hunting is a proactive process that looks for abnormal activity. After years of leading the industry with our endpoint detection and response (EDR) solution, CB Response, Carbon...

    Download Now