Resources

Find more information about solutions and services, our technology and research insights, webinars and other resources on a wide array of subject matter.

Cyber Defenders Council Report: Defend Forward - A Proactive Model for Cyber Deterrence

The Cyber Defenders Council is an independent group of preeminent cybersecurity leaders from public and private sector organizations around the world with the mission to adapt Defend Forward deterrence concepts for the private sector - read the inaugural report here...

White Paper: Inside Complex RansomOps and the Ransomware Economy

This white paper examines the growing threat from complex RansomOps, as well as the larger Ransomware Economy, and provides prescriptive guidance for organizations determined to remain undefeated by ransomware attacks...

The Definitive Guide to Extended Detection and Response (XDR)

The Definitive Guide to Achieving 10X the Security Results Without 10X the Work is for security leaders who are seeking answers to how XDR can help them address the most pressing operational and business challenges facing cybersecurity teams...

EDR Buyer’s Guide: Microsoft E5 Licenses and Security Risks

Microsoft introduces vulnerabilities at an astounding pace, but still wants organizations to bundle IT and Security spend with an expensive E5 license - learn why "good enough" security is just not good enough for today's advanced threats...

Gartner Report: 2021 Competitive Landscape for Endpoint Protection Platforms

Cybereason delivers superior endpoint protection against sophisticated attacks through multi-layered prevention, AI-powered behavioral detection and comprehensive response...

ESG Research Report: 2021 Trends in Endpoint Security

Though there is no explicit definition of an endpoint protection platform (EPP), but there are qualifications for what a good solution looks like - download the complimentary ESG report to learn more...

Gartner Report: How to Prepare for Ransomware Attacks

Security and risk management leaders need to look beyond the endpoints to help protect the organization from ransomware - fine-tuning incident response processes is a key component for successful mitigation of these multi-stage attacks...

Report: Ransomware Attacks and the True Cost to Business

A new global research study conducted by Cybereason reveals that the majority of organizations suffered significant business impact following a ransomware attack...

Integrating Endpoint and Mobile Device Security

The goal of this whitepaper is to help enterprise teams reduce gaps in their security architecture and improve the endpoint and mobile experience for their users...

Inside Effective EDR Evaluation Testing

We go into some of the methodology of EDR and we analyze “testing tools" to demonstrate the flaws in their use and explain why the results are unreliable when pitted against a modern EDR system...

Ransomware Decoded: Preventing Modern Ransomware Attacks

Understand how to detect the preliminary stages of an attack, analyze the scope of the operation and prevent execution of the malicious code...

Five Clear Steps to Enhance SecOps with MITRE ATT&CK

With these five steps, you can continuously tune your security strategy and leverage the connection between techniques, tactics, and procedures and real-world adversary groups...

Cybereason Exposes Campaign Targeting US Taxpayers with NetWire and Remcos Malware

Cybereason researchers have discovered a new campaign targeting US taxpayers with documents that purport to contain tax-related content but ultimately deliver NetWire and Remcos malware - two prolific remote access trojans.

The Security Value of Exploit Protection

One feature that Cybereason provides to protect users from exploit attacks is our Exploit Protection. This blog provides a quick rundown of some of the key terms used in understanding exploit attacks.

Wipro’s State of Cybersecurity Report Reveals Valuable Insights

The State of Cybersecurity Report 2020 from Wipro highlights trends and insights and provides guidance to help improve and maintain cyber resilience.

Impact of XDR on the Modern SOC: New ESG Report

A new report from ESG, the Impact of XDR on the Modern SOC, is focused on the perception and value of XDR, and certainly reveals a number of interesting insights around how teams are prioritizing investment against attacks.

Ryuk Ransomware: Mitigation and Defense Action Items

Cybereason recommends activating their prevention stack to be set on “Prevent” mode (AV, NGAV, Powershell, AntiRW) to protect against Ryuk ransomware.

VB2020: Anchor, Bazar, and the Trickbot Connection

Cybereason Nocturnus Team members Daniel Frank and Lior Rochberger will be presenting a session titled, Anchor, Bazar, and the Trickbot Connection, examining some new developments regarding a familiar threat actor.

Time for an Upgrade: How to Switch from Symantec to Cybereason

If you are still using Symantec, you’re most likely tired of the complex workflows, the gaps in detection, and a resource-heavy solution that inhibits workflows and productivity. If so, it’s time to level up to a better solution that’s leading the industry.

Cyber Security Tips for Allowing Employees to Work From Home

While the ability to allow staff to work remotely when needed gives greater flexibility to corporations, it also comes with cybersecurity risks. Not only can remote workers put their own privacy at risk, but working remotely could result in a breach in the company’s security.

Protecting Against Potential Cybersecurity Threats Brought on by Remote Work

In pivoting an entire workforce to remote work, employers need to be prepared for the cybersecurity risks involved. To guard against these threats, employers should have a remote work policy that all employees are aware of and comply with.

Increase in Remote Work Spurs Demand for EDR Cybersecurity

With the sudden increase in telework, the traditional approach of reacting to cyber threats and security issues only after a breach is discovered is no longer sufficient.

What are Adversary Emulation Plans?

Though AEPs are especially important when testing and building a strong defense, they are often overlooked for TTPs by security practitioners versed in the “trench warfare” of day-to-day security operations.

Perspectives on Maintaining Secure Business Continuity: A Guide

In this blog, you'll find perspectives from several of our experts with experience in managing crises across security and business functions.