Whitepapers


Sort by: Date | Company | Title


A Practical Guide to Efficient Security Response
By ServiceNow | 16/4/2018

How would you rate your organisation's ability to respond to security threats and vulnerabilities? Use this short checklist to evaluate how the right security operations solution could support your enterprise.

Download this now


Automate Vulnerability Remediation Using Tenable and ServiceNow
By ServiceNow | 16/4/2018

The Tenable and ServiceNow integrated solution gives your security team a single response platform for complete visibility and control in assessing and responding to security incidents and vulnerabilities.

Download this now


Freedom Security Alliance Dramatically Accelerates Security Response Services
By ServiceNow | 16/4/2018

This case study covers how ServiceNow Security Operations bridges the gap between Security and IT.

Download this now


Stopping Email Fraud
By Proofpoint | 10/4/2018

How Proofpoint helps protect your organisation from impostors, phishers and other non-malware threats.

Download this now


The State of Email Fraud: Year In Review
By Proofpoint | 10/4/2018

Email fraud is one of today’s greatest cyber threats.

Download this now


Email Fraud Threat Report
By Proofpoint | 10/4/2018

​Email fraud is nothing new, but online criminals have become ever more-effective at spoofing their identities to trick employees into sending them money. The Australian Centre for Cyber Security (ACSC) recorded losses of over $20M to business email compromise (BEC) attacks last year alone, up 230 percent over the previous year – and the full amount is certain to be much larger.​

Download this now


Preparing For The New OWASP Top 10 and Beyond
By F5 Networks | 21/3/2018

There’s a reason why web application firewalls have been getting so much attention lately. It’s the same reason we keep hearing about major security and data breaches left, right, and centre. Web application security is difficult—very difficult. Fortunately, there are options.

Download this now


Preparing for the new OWASP Top 10 and Beyond
By F5 Networks | 16/3/2018

There’s a reason why web application firewalls have been getting so much attention lately. It’s the same reason we keep hearing about major security and data breaches left, right, and center. Web application security is difficult—very difficult.

Download this now


Iron Mountain vs Amazon Glacier: Total Cost Analysis For Off-Site Storage
By Iron Mountain | 9/3/2018

Amazon’s Glacier is a cloud storage offering designed for the storage of data which doesn’t require fast access or recovery time objective (RTO). Iron Mountain is a similar service for storing data offsite, but uses physical data tape storage from the customer’s data center vs. the cloud storage approach of moving data directly from disk across wide area networks (WAN) into a remote, cloud storage facility.

Download this now


Tape and Cloud: More than a marriage of convenience
By Iron Mountain | 9/3/2018

With growing regulations around information management, litigation on the rise and massive quantities of data being generated every day, organisations need to store and protect increasing volumes of data for set periods of time.

Download this now

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release