Security Whitepapers


Sort by: Date | Company | Title


The Ransomware Threat: A Guide to Detecting an Attack Before it’s Too Late
By LogRhythm | 27/9/2016

This guide shares the expert knowledge that researchers at LogRhythm have gathered about how ransomware attacks begin, how they progress through your endpoints and network, and what you can do to prevent them, or at least shut them down, to avoid serious repercussions.

Download this now


Top 5 Steps to Reduce File Data Leakage Risks
By FinalCode | 26/9/2016

Given the necessity of file sharing, respective risks and obligations, and available file protection mechanisms, what is a pragmatic approach for organizations to reduce IP loss, privacy compliance liability and business exposure due to sensitive file data leakage. Here are the top 5 steps that your organization can put in place today.

Download this now


On the Radar: FinalCode addresses persistent file security challenges for the enterprise
By FinalCode | 26/9/2016

Maintaining control over cloud access, collaborative applications, and user mobility are three of the major challenges to protecting data and files that enterprise IT departments face.

Alongside the task of maintaining appropriate enterprise network resource access, organizations need file protection products that offer appropriate levels of control for the internal users and the variety of external users requiring access to sensitive and/or regulated information. Satisfying these challenges is necessary to protect the intellectual property of the business and its market position, and to manage the reputation and liability risks associated with privacy and compliance.

Download this now


EMA Survey Report
By FinalCode | 26/9/2016

File Insecurity: The Final Data Leakage Frontier

Download this now


Infographic: INSIGHTS: THE 2016 AUSTRALIAN IT SECURITY STRATEGIES SURVEY
By Dell Secureworks | 12/9/2016

It may have taken years, but greater executive involvement in IT security strategy is putting real weight behind the transformation that is seeing Australian businesses revisit their security practices and the escalation of authority behind crucial security initiatives. The CSO-Dell Secureworks IT Security Strategy Survey 2016 highlighted the extent of this transformational trend, with an almost even split between the number of companies where security executives report to the CIO and those that report to other business executives.

Download this now


INSIGHTS: THE 2016 AUSTRALIAN IT SECURITY STRATEGIES SURVEY: TOP TIPS
By Dell Secureworks | 12/9/2016

INSIGHTS: THE 2016 AUSTRALIAN IT SECURITY STRATEGIES SURVEY: TOP TIPS

Download this now


INSIGHTS: THE 2016 AUSTRALIAN IT SECURITY STRATEGIES SURVEY
By Dell Secureworks | 12/9/2016

T here is nothing new about arguments that information security should be recognised as a high-level concern – and handled at the highest levels of the organisation. However, according to the recent CSO-Dell Secureworks IT Security Strategy Survey 2016, Australian businesses are making great strides towards making this happen.

Download this now


Five Ways to Battle Email Security with Confidence
By Mimecast | 6/9/2016

IT security pros know email is a gateway for cyber-attack but too many feel insecure.

IT pros who have lived through an email hack/breach are more than four times as likely to feel much more vulnerable than one year ago compared to those without experience. This infographic provides 5 tips to regain your security confidence.

Download this now


Email Security in a Zero Trust World
By Mimecast | 6/9/2016

The security landscape is more challenging than ever before. Rapidly evolving threats and hackers who are always one step ahead demand a security model that can adapt in real-time. Faced with this constant change, it is easy to become distracted by a blizzard of emerging technologies while leaving the back door open by failing to address existing technologies, people and processes.

This whitepaper looks at some of the most important considerations in turn - including the cloud, new threats, digital businesses and legacy security - from the following perspectives;

- The CISOs strategic view - Tactical operations for the IT Manager - Best practice deployment

Download this now


S&R Pros Must Empower Employees To Prevent Phishing Attacks
By Mimecast | 6/9/2016

In a phishing attack, cybercriminals use email and/or social media to trick employees into revealing confidential information about themselves or their firms or clicking on malicious files or web links that infect their computers with malware.

In this report, we look at where security awareness is going wrong and how security and risk (S&R) pros can revamp their security awareness programs to empower employees to protect themselves and their firms from phishing attacks.

Download this now

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Media Release

More media release

Market Place