Security Whitepapers


Sort by: Date | Company | Title


The definitive email security ebook
By Proofpoint Pty Ltd | 27/10/2017

The Problem: Attacks are evolving faster than email defenses. Organizations are spending more on cybersecurity than ever, even as losses from data breaches, business disruption, and fraud continue to mount.

Learn how to prevent the top email fraud tactics including:

Business Email Compromise techniques Advanced Malware including Ransomware Outbound Phishing Get the 5 steps to building your email security strategy across the entire attack chain – from prevention through real-time response.

Download the Definitive Email Security Strategy Guide now.

Download this now


The Human Factor Report 2017 Infographic
By Proofpoint Pty Ltd | 19/10/2017

The headline stories of the threat landscape in 2016 were of the explosive growth of ransomware, the massive email campaigns that distributed it to organisations of all sizes, and the exponential increase in email fraud attacks that have cost businesses billions in theft, disruption and reputational damage. Criminals are now targeting individuals, not companies or infrastructure. See key findings from our Human Factor Report.

Download this now


Human Factor Report 2017
By Proofpoint Pty Ltd | 19/10/2017

The headline stories of the threat landscape in 2016 were of the explosive growth of ransomware, the massive email campaigns that distributed it to organisations of all sizes, and the exponential increase in email fraud attacks that have cost businesses billions in theft, disruption and reputational damage. Criminals are now targeting individuals, not companies or infrastructure. See key findings from our Human Factor Report.

Download this now


Strengthen Your Defenses Against Cybercrime
By Mimecast | 23/8/2017

As organisations learn to navigate life in the cloud, they need a new level of preparedness. Read this report to find out more about cyber resilience planning for email.

Download this now


Advancing Your Anti-Phishing Program
By Mimecast | 23/8/2017

This report includes Gartner research discussing the full scope of the inbound phishing threat, and identifies effective mitigation strategies.

Download this now


CSO Security Buyers Guide 2017
By CSO | 11/8/2017

The pressure is on to be secure. Are you feeling the squeeze?

If you spent the past few years coming to grips with the true extent of the threat from malware, ransomware and nation-state hackers, be prepared for the rest of 2017 to play out rather differently. Sure, the threats are still there and growing but as Australia prepares to join the ranks of the nations with mandatory breach reporting regimes, you are now operating under the microscope and on a deadline.

Download this now


How to make your business more secure using Dell & Windows 10
By Dell | 4/8/2017

Effectively securing your enterprise is a continuous effort that requires constant attention and improvements. Rapid technological change can resolve business problems and pave the way towards digital transformation, but it also creates new points of potential vulnerability – which can create new security problems that interrupt or disable the business.

Download this now


Gigamon Improves Security Visibility With Splunk Enterprise
By Gigamon | 12/7/2017

In a Security Operations Center (SOC), success depends upon the ability to effectively analyze network events for security threats. However, collecting and correlating the right traffic data from across the network can be challenging.

Download this now


Gigamon Transforms Security
By Gigamon | 12/7/2017

This infographic looks at the importance of visibility to networks and examines the need to re-evaluate security strategies to move away from legacy security models. Included is also a FAQ which addresses the basic functions of SDP, who it can help and examples of use cases.

Download this now


Troubling Trends in Network Security
By Gigamon | 12/7/2017

Network security operations are evolving and becoming more difficult to implement. This infographic explains why and the next steps to take.

Download this now

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release

Market Place