All Research Sponsored By:Kaspersky

How сan threat intelligence be tailored to your organization?
WHITE PAPER: Threat intelligence (TI) that isn’t tailored to your organization isn’t real intelligence. So, how can you get TI that’s right for you? Find out in this e-book, which outlines the differences between intelligence and data, when and where to use TI, how to maximize the benefits of TI for your organization, and more.
Posted: 07 Dec 2023 | Published: 07 Dec 2023

TOPICS:  .NET

How Is This Happening To Us?
PRODUCT OVERVIEW: You may not be aware of it, but your organization’s constantly evolving digital footprint can lead to a variety of security risks and vulnerabilities. So, take a moment to get a clearer picture of the potential threats resulting from your digital footprint – and what you can do to tackle them.
Posted: 07 Dec 2023 | Published: 07 Dec 2023

TOPICS:  .NET

How is this happening to us?
INFOGRAPHIC: Dealing with phishing and scam URLs requires a thorough understanding of your footprint, through a combination of network reconnaissance, continuous dark web monitoring, and data leakages discovery. You can get all these capabilities and more with the Digital Footprint Intelligence service. Take a look now to learn more.
Posted: 07 Dec 2023 | Published: 07 Dec 2023

TOPICS:  .NET

Threat hunting – what, why and how
EBOOK: While many organizations utilize cybersecurity solutions like endpoint protection platforms (EPPs), around 10% of cyberthreats are capable of bypassing these defenses. Read this e-book to understand how threat hunting can level up your business’s security posture in the face of these threats.
Posted: 07 Dec 2023 | Published: 07 Dec 2023

TOPICS:  .NET

Threat Intelligence: Maximizing The Benefits
WHITE PAPER: While the uses and benefits of TI are many and varied, so are its sources, to the extent that trying to identify what will work best for your particular organization can be a challenge in itself. So, how can you ensure TI delivers the maximum benefits to your enterprise? Download this whitepaper to learn more.
Posted: 07 Dec 2023 | Published: 07 Dec 2023

TOPICS:  .NET

Is Your Use Of Threat Intelligence Up To Scratch?
RESOURCE: In under 10 minutes, Kaspersky’s easy online tool lets you assess your team’s capabilities against 15 key metrics like time to detect, triage and prioritizing incident response, and dealing with false positives - and get customized recommendations based on your responses. Check out this resource to learn more.
Posted: 06 Dec 2023 | Published: 06 Dec 2023

TOPICS:  .NET

Kaspersky Digital Footprint Intelligence
PRODUCT OVERVIEW: Dealing with phishing and scam URLs requires a thorough understanding of your footprint, through a combination of network reconnaissance, continuous dark web monitoring, and data leakages discovery. You can get all these capabilities and more with the Digital Footprint Intelligence service. Take a look now to learn more.
Posted: 06 Dec 2023 | Published: 06 Dec 2023

TOPICS:  .NET

People, Processes, Technology: Building A Successful Security Operations Center
WHITE PAPER: Security Operations Centers (SOCs) are an increasingly popular way for organizations to secure themselves by centralizing personnel, tools and expertise. However, building or expanding an existing SOC involves overcoming many complex challenges. Download this white paper to learn how to solve these problems on your way to building the future SOC.
Posted: 06 Dec 2023 | Published: 06 Dec 2023

TOPICS:  .NET

Your way to XDR
INFOGRAPHIC: Security teams in organizations the world over are struggling with alert overload, disconnected tools, overwhelmed analysts, and so much more. But with an extended detection and response (XDR) solution, analysts can gain access to a single pane of glass with simple, fast automation tools. Learn more about XDR in this infographic.
Posted: 01 Nov 2023 | Published: 01 Nov 2023

TOPICS:  .NET

The innovative potential of XDR
WHITE PAPER: Extended detection and response (XDR) is the hottest tech on the block, with Forrester stating that differentiated XDR “will supersede endpoint detection and response (EDR) in the short term and usurp SIEM in the long run.” Download this white paper for an intro to XDR and access 5 key things to consider when comparing XDR vendors and solutions.
Posted: 31 Oct 2023 | Published: 31 Oct 2023

TOPICS:  .NET

The Cornerstone of a Successful Cyber Defense Strategy
ANALYST REPORT: Disparate security tool sets and a scarcity of skilled staff, compounded with a digital revolution, are exposing enterprise security gaps and contributing to a spike in cybercrime. Download this IDC eBook to learn how digital leaders are
Posted: 26 Oct 2023 | Published: 26 Oct 2023

TOPICS:  .NET

Why Are Targeted Ransomware Attacks So Successful?
WHITE PAPER: The ransomware game has changed, and with today’s high-profile and complex attacks always evolving, it’s critical for organizations to keep up. So, what are the best ways to do this? Access this white paper to learn more.
Posted: 13 May 2023 | Published: 13 May 2023

TOPICS:  .NET

What kind of threat intelligence does your organization need?
INFOGRAPHIC: Your organization has unique cybersecurity needs, and Kaspersky aims to meet them. With Kaspersky, you can achieve threat intelligence that’s tailored to your organization’s systems and processes. Check out this infographic to discover 6 reasons why you should consider adopting Kaspersky Threat Intelligence.
Posted: 08 Mar 2023 | Published: 09 Mar 2023

TOPICS:  .NET

Threat hunting – what, why and how
EBOOK: Take a look through this e-book for an introduction to modern threat hunting tools, and learn how a proactive, pre-emptive approach to threat management can help minimize harm and strengthen future security controls.
Posted: 30 Aug 2022 | Published: 30 Aug 2022

TOPICS:  .NET

Threat Management: Facing Up to Complexity
WHITE PAPER: Complex incidents present very specific challenges that involve many aspects of the organization’s infrastructure that’s under attack. Within this paper, fully understand the 5 key barriers to successful complex incident resolution and how to deal with complex cyber-incidents caused by modern sophisticated threats.
Posted: 22 Jun 2021 | Published: 22 Jun 2021

TOPICS:  .NET

SMB Cybersecurity: The Need for Better Protection
EGUIDE: Small and medium-sized businesses (SMBs) are failing to keep their remote working employees adequately protected against the vast range of cyber threats they face, according to a study by Kaspersky. Access this e-guide to learn why many SMBs are turning to managed detection and response today.
Posted: 07 Jul 2020 | Published: 01 Jul 2020


Remote Work Cybersecurity: Best Practices & Trends
EGUIDE: The COVID-19 pandemic has sparked an increase in malware attacks. To make matters worse, many people now find themselves working from home without any special IT awareness training to help them identify cyberattacks. In this e-guide, learn more about how to gain control of your cybersecurity during these times of uncertainty.
Posted: 06 Jul 2020 | Published: 30 Jun 2020


Kaspersky Lab’s COVID-19 Relief Initiatives
EGUIDE: Amid the stress caused by the COVID-19 pandemic, it’s nice to know that there are companies out there offering resources and assistance to organizations heavily affected. Download this e-guide to unlock 2 articles highlighting current COVID-19 relief initiatives at Kaspersky Lab.
Posted: 06 Jul 2020 | Published: 29 Jun 2020


Advanced Attacks are Catching On - Here's What you can Do
EGUIDE: In this e-guide, Kaspersky Lab reports on how enterprises can upgrade their security programs against APT-style attacks. Uncover the effectiveness of network segmentation when it comes to detecting attacks that have bypassed your controls.
Posted: 02 Nov 2016 | Published: 27 Oct 2016


Malware Analysis: How Some Strains 'Adapt' to Virtual Machines
EGUIDE: Server-oriented malware is actually more likely to infect a virtual system than a physical one in many organizations. Now what? This expert e-guide provides the real story of how malware is adapting to virtual environments, so you can ensure protection going forward.
Posted: 01 Nov 2016 | Published: 27 Oct 2016


Cutting Complexity – Simplifying Security
WHITE PAPER: Kaspersky Lab's latest whitepaper, "Cutting Complexity – Simplifying Security" looks at how the latest IT Systems Management solutions can simplify and automate a vast range of routine IT management tasks.
Posted: 10 Oct 2013 | Published: 17 Jan 2013


IT Security. Fighting the Silent Threat
WHITE PAPER: Kaspersky Lab experts are releasing new research designed to assist you in your cybersecurity business decisions. Download the report now to get quantifiable statistics about perceived versus real cyberattacks.
Posted: 09 Oct 2013 | Published: 09 Oct 2013


Webmail Forensics: Investigating Issues with Email Forwarding Security
EGUIDE: This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.
Posted: 22 Apr 2013 | Published: 22 Apr 2013


Kaspersky Endpoint Security 8 for Windows
WHITE PAPER: Organizations today must chose and implement the right tools to help control and manage the increasing array of applications, devices and Web content. In this report, uncover a comparative functionality evaluation of Kasperksy Lab’s Endpoint Security 8 for Windows and five other leading endpoint security suites. View now to explore key findings.
Posted: 08 May 2012 | Published: 03 Oct 2011


Overcoming virtualization security risks: Best practices
EGUIDE: Read this expert e-guide to learn best practices for securing your virtualized environment. Gain insights on how to overcome common challenges and minimize potential risks.
Posted: 18 Apr 2012 | Published: 18 Apr 2012