Thank you for taking VIBriefings’ 2020 Cloud & Virtualization Survey

Carbon Black MITRE ATT&CK WORKBOOK

Divided into 12 Tactics, ATT&CK defines roughly 300 Techniques (TIDs) to define how an adversary can achieve each tactic. The intent of this workbook is to provide a starting point for organizations looking to map to the ATT&CK Framework or simply better their security posture in 3 simple steps. Download our workbook today to learn more!

Download now!

 

 

VMware Carbon Black Holiday Threat Report

According to the VMware Carbon Black Threat Analysis Unit (TAU), retail organizations may see a noticeable spike in attempted cyberattacks during the holiday season. “This guide is an introduction to the world of cybersecurity—it’s history, language and resources—so you can further educate yourself on this rapidly evolving area of IT. With over 150 sourced references, this guide is sure to get you connected with both knowledge and the cybersecurity community.

Download now!

 

VMware Carbon Black Modern Bank Heists

The financial sector has long been the target of some of the world’s greatest guilds of thieves, none perhaps more popular than the Dillinger gangs of the 1930s.

In the second annual “Modern Bank Heists” report, VMware Carbon Black collaborated with Optiv to survey CISOs at some of the world’s largest financial institutions to uncover cyberattack trends. This second annual report highlights how financially motivated criminals have evolved from stagecoaches and stickups to targeted cyberattacks.

To better determine how these cybercriminals are hiding behind invisibility cloaks to remain undetected, VMware Carbon Black conducted a survey, comprising input from CISOs of many of the world’s largest financial institutions. The purpose of the survey is to improve telemetry for threat hunt teams and defenders.

Download now!

 

Pluralsight – Introduction to code churn

When engineering leaders can clearly visualize progress, identify bottlenecks, and watch trends across multiple teams, they can notice when something’s off before a deadline is missed. They can experiment with meeting structure and timing, provide actionable feedback, and stay out of the details that should be handled at other levels. Then, they can measure the impact of those decisions.

Download now!

 

 

Siemplify The Business Case For SOAR

This paper details the various ways SOAR solutions can save security operations organizations millions of dollars annually through increased efficiency and better resource allocation. Enterprises generally see these savings spread across four key areas: alert handling costs, reporting costs, analyst training costs and miscellaneous operational costs. SOAR solutions also provide organizations with multiple benefits that are less quantifiable yet still provide value to the organization.

Download now!

 

 

Compliance Demystified: General Principles of IT Compliance

Having a documented data security policy is a best practice for every organization — especially those that are subject to today’s increasingly stringent information privacy regulations. Often a part of a broader information security policy, a data security policy addresses topics such as data encryption, password protection and access control.

Here is a data policy template for access control that you can adapt to meet your organization’s specific requirements, such as the need to comply with the EU’s General Data Protection Regulation (GDPR) privacy policy.

Download Now!

 

Netwrix Data Security Policy Template

Having a documented data security policy is a best practice for every organization — especially those that are subject to today’s increasingly stringent information privacy regulations. Often a part of a broader information security policy, a data security policy addresses topics such as data encryption, password protection and access control.

Here is a data policy template for access control that you can adapt to meet your organization’s specific requirements, such as the need to comply with the EU’s General Data Protection Regulation (GDPR) privacy policy.

Download Now!

Global Cybersecurity Survey 2019

To better understand the day-to-day realities of cybersecurity facing IT teams across the globe, Sophos commissioned independent research specialist Vanson Bourne to survey 3,100 IT decision makers across 12 countries and six continents.
To ensure representative data, respondents were from a wide range of industries. Within each country, respondents were split equally between 100-1,000 user organizations and 1,001-5,000 user organizations. The survey was conducted between December 2018 – January 2019.