This research report explores the importance of security strategy and Cyber Threat Intelligence. The purpose of the study is to understand how companies are using, gathering and analyzing threat intelligence as part of their IT security strategy.
Some of the topics covered are:
Whether timely, accurate and actionable cyber threat intelligence make a difference in blocking or preventing external attacks.
Are companies using cyber threat intelligence effectively to make informed decisions about how to respond to a menace or hazard
Access control is a fundamental element of security in higher education, impacting every department and every stakeholder throughout an institution. However, costs are an obstacle, and many aging access control systems urgently need to be upgraded. Managing systems can also be a challenge, although there are new technology options that can make life easier for administrators as well as those who use the systems. HID Global and Genetec commissioned a survey to provide insights about access control in the higher education market. This report will highlight the results of that survey with additional commentary. Download whitepaper »
This white paper will explore the critical challenges that security teams face in this new era of cyber-threat, and how Darktrace Antigena is leveraging AI to autonomously fight back against advanced attacks, giving human responders the critical time needed to catch up. Download whitepaper »
Your end to end guide on digital procurement and modern device management. When managed well, data becomes information, allowing an organisation to build knowledge and make informed decisions. Download now to learn more. Download whitepaper »
It’s not hard to understand why bot management is critical to maintaining business availability and customer satisfaction – but do you know how to properly deal with bots?
Increasing use of encryption has created new challenges for enterprise security managers. Ever more-sophisticated encryption such as Perfect Forward Secrecy (PFS) protects data and may even boost your Google ranking – but it also provides a haven for malicious code that may use encryption to bypass enterprise security controls.
Why nation-state attacks are everyone’s problem
With so much change all the time, how can executives best prepare their businesses to meet the security challenges of the coming years? CSO Australia, in conjunction with Mimecast, explored this question in an interactive Webinar that looks at how the threat landscape has evolved – and what we can expect in 2019 and beyond.
An interview with CSO's David Braue and Ian Yip, Chief Technology Officer, McAffee.