Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Carbon Black

Carbon Black has designed the most complete next-gen endpoint-security platform, enabling organizations to stop the most attacks, see every threat, close security gaps, and evolve their defenses. The Cb Endpoint Security Platform helps organizations of all sizes replace legacy antivirus technology, lock down systems, and arm incident response teams with advanced tools to proactively hunt down threats. Today, Carbon Black has approximately 2,000 worldwide customers, including 25 of the Fortune 100 and more than 600 employees. Carbon Black was voted Best Endpoint Protection by security professionals in the SANS Institute's Best of 2015 Awards.

Our Website: http://www.carbonblack.com


Latest Content From Carbon Black

E-Book: Global Threats: A Combat Guide for Rising Cyber Attacks

by Carbon BlackMar 23, 2020

With every passing day, attackers are becoming smarter and smarter. They're learning how to better evade defenses and maintain access to systems undetected. And they aren't discriminating based on location, size or industry. Whether your organization has 100 people in Sweden or 100,000 people in the United States—you are a target.

The first step in stopping an attack is to understand it. This means that, now more than ever, defenders need to understand the adversary and the ways their networks and endpoints are being infiltrated. To help, this guide explains the most common threats in the wild today. The following chapters are designed to offer insight into what these attacks are, how they work, and how to stop them.


Whitepaper: Cyber Security in Healthcare

by Carbon BlackMar 23, 2020

Healthcare is one of the most highly targeted industries by cyber criminals, with attacks including ransomware, data theft, and business email compromise (BEC), among others. With attacks only expected to increase, it's important to ensure your security environment is ready in 2020.

Download this whitepaper from Osterman Research to gain insight on:

  • The current security environment in the Healthcare industry
  • Expectations of changing Threat Dynamics
  • Tips to improve your security posture


Research Report: Endpoint Security 2020: The Resurgence of EPP and the Manifest Destiny of EDR

by Carbon BlackMar 23, 2020

The big EDR news of 2020 will be about extending EDR beyond the endpoint into other sources of telemetry and other control points such as: the network, the user, and the application. It's about factoring in greater context about applications and infrastructure. Some call this extended EDR — or XDR. The combination of the Carbon Black team with VMware — the digital foundation of mobility, cloud and modern application frameworks — is in the strongest position of anyone to execute on this vision.


Research Report: 2020 Cybersecurity Outlook Report

by Carbon BlackMar 23, 2020

In the search for clarity in the modern attacker vs. defender battle, it's all about behaviors

The conflict of "good vs. evil" is a theme that's captivated humanity throughout history, spanning religion, ethics, philosophy, politics, art, literature, and cinema. Often with larger-than-life characters leading the narrative, the "good vs. evil" conflict reveals humanity's intrinsic desire to be safe amidst an omniscient and, often, ephemeral sense of fear.

Our goal is to offer a holistic view of how attackers have evolved, what defenders are doing to keep pace, and how security and IT teams can work together in 2020 and beyond in the unending battle of "good vs. evil."


E-Book: MITRE ATT&CK Workbook

by Carbon BlackMar 23, 2020

Divided into 12 Tactics, ATT&CK defines roughly 300 Techniques (TIDs) to define how an adversary can achieve each tactic. The intent of this workbook is to provide a starting point for organizations looking to map to the ATT&CK Framework or simply better their security posture in 3 simple steps. Download our workbook today to learn more!


E-Book: How to Combat Ransomware

by Carbon BlackDec 05, 2019

Ransomware isn't new—in fact, it's over 30 years old. Attacks date back as far as 1989 and have been the most pervasive cyber threat since 2005, with a dramatic spike in recent years. The resulting costs to targeted businesses are soaring. In fact, according to the 2018 Verizon Data Breach Investigations Report, ransomware has moved from the 22nd most common variety of malware in 2014 to the most common variety in 2018.

It is estimated that, by the end of this year, ransomware will attack a business once every 14 seconds.

To help you understand this threat, what it looks like in your environment, and the role Carbon Black can play in helping to combat it, take a look at this Ransomware issue of our Global Threats eBook series.


E-Book: How to Combat Nation-State Attacks

by Carbon BlackDec 05, 2019

Nation-state attacks are sophisticated cyberthreats from adversaries working directly or indirectly for their own government. Their motivation? To place their nation in a better position against their political enemies. The targets of nation-state attacks range from private hospitals and financial institutions to election infrastructures, making them one of the largest global security threats today.

To help you understand this threat, what it looks like in your environment, and the role VMware Carbon Black can play in helping to combat it, take a look at this Nation-State Attacks issue of our Global Threats eBook series.


Research Report: Healthcare Cyber Heists in 2019

by Carbon BlackSep 27, 2019

Healthcare organizations are increasingly being targeted by cyberattacks due to the gold mine of personal data they possess. The phrase, "First, do no harm," is commonly referenced among medical professionals to reflect the utmost importance placed on patient care. The phrase is often attributed to the original version of the Hippocratic oath, though its true derivation is, in fact, unknown. Regardless of the etymology, the sentiment is clear: above all else, a healthcare professional should consider patients' well being. And in 2019, "well being" has evolved to include privacy and cybersecurity concerns.

The potential, real-world effect these attacks can have is substantial. (See the WannaCry and NotPeyta ransomware attacks of 2017.) Cyberattackers now have the ability to access, steal and sell patient information on the dark web. Beyond that, they have the ability to shut down a hospital's access to critical systems and patient records, making effective patient care virtually impossible.

And, with increased adoption of medical and IoT devices, the surface area for healthcare attacks is becoming even larger. The problem has been further compounded by limited cybersecurity staffing and stagnant cybersecurity budgets in the industry.

Download your copy of Healthcare Cyber Heists in 2019 to learn more about the challenges faced by the healthcare industry at large, and what you can look out for to protect your business no matter what vertical you may find yourself in.


E-Book: How to Combat Spear Phishing

by Carbon BlackSep 27, 2019

Spear Phishing is one of the most common and most effective cyberattack vectors used today. Delivered through email, spear phishing campaigns aim either to infect devices with malware, or to steal important information like credentials and bank numbers.

To help you understand this threat, what it looks like in your environment, and the role Carbon Black can play in helping to combat it, take a look at this Spear Phishing issue of our Threats on the Rise eBook series.


E-Book: How to Combat Island Hopping

by Carbon BlackSep 27, 2019

More and more, cybercriminals are targeting smaller organizations as a means to attack larger ones. Attackers are exploiting vulnerabilities in the defenses of these less sophisticated companies and using their affiliation with the target as a point of entry. This is known as "Island Hopping."

To help you understand this threat, what it looks like in your environment, and the role Carbon Black can play in helping to combat it, take a look at this Island Hopping issue of our Threats on the Rise eBook series.