Security Whitepapers


Sort by: Date | Company | Title


Credential Stuffing: A Security Epidemic
By F5 Networks | 14/6/2018

The world set a new record for data breaches in 2016, with more than 4.2 billion1 exposed records, shattering the former record of 1.1 billion in 2013.

Download this now


Understanding Email Fraud - A global survey of IT leaders in the US, the UK, Australia, France, and Germany
By Proofpoint | 31/5/2018

Understanding Email Fraud - A global survey of IT leaders in the US, the UK, Australia, France, and Germany

Download this now


Australia Mandatory Data Breach Notification Report
By FireEye | 28/2/2018

Australian businesses face an eye-opening transition to the new notifiable data breaches (NDB) scheme as the new legislation requires companies to notify the Privacy Commissioner, and any affected individuals, of any data breach that meets the legislative parameters within 30 days.

This white paper summarises what you need to know about the legislation, how it will affect Australian businesses, as well as some tips for how to be prepared and how best to respond publicly to any potential data breach.

Download the report to find out more.

Download this now


Using Metrics to Mature Incident Response Capabilities
By FireEye | 26/2/2018

Incident response requires a symbiotic relationship between people, process and technology. Organizations can take several recommended steps to diminish the threat; however, the risk of compromise can never be eliminated. Knowing this, Mandiant recommends that companies focus on improving the cycle time for their incident response process, defining this as a function of the time between initial compromise and threat containment. To this end, metrics play a key role in maturing an organization’s incident response capability.

Download this now


12 Proven Cyber Incident response Strategies
By FireEye | 26/2/2018

Cyber threats are constantly evolving, increasing in both sophistication and how they impact victims. In today’s world, you must battle a wide range of adversaries, from hacktivists to state sponsored threats. The most significant of these threats are advanced attackers who carefully plan and execute breaches into victim organizations. These targeted attackers quietly insert themselves into your environment, leveraging legitimate credentials to survey the environment and dig in deeper for extended operations. They can stay hidden for months—or years—all while advancing their mission, be it stealing your data or using your organization’s environment as a way to infiltrate another victim.

Download this now


How to Enhance Your Security Team
By FireEye | 26/2/2018

IT’S A DAUNTING TASK FOR ANY ORGANIZATION TO FIND, HIRE, TRAIN AND RETAIN THE TALENT IT TAKES TO CREATE A WORLD-CLASS CYBERSECURITY TEAM.

Download this now


The definitive email security ebook
By Proofpoint Pty Ltd | 27/10/2017

The Problem: Attacks are evolving faster than email defenses. Organizations are spending more on cybersecurity than ever, even as losses from data breaches, business disruption, and fraud continue to mount.

Learn how to prevent the top email fraud tactics including:

Business Email Compromise techniques Advanced Malware including Ransomware Outbound Phishing Get the 5 steps to building your email security strategy across the entire attack chain – from prevention through real-time response.

Download the Definitive Email Security Strategy Guide now.

Download this now


The Human Factor Report 2017 Infographic
By Proofpoint Pty Ltd | 19/10/2017

The headline stories of the threat landscape in 2016 were of the explosive growth of ransomware, the massive email campaigns that distributed it to organisations of all sizes, and the exponential increase in email fraud attacks that have cost businesses billions in theft, disruption and reputational damage. Criminals are now targeting individuals, not companies or infrastructure. See key findings from our Human Factor Report.

Download this now


Human Factor Report 2017
By Proofpoint Pty Ltd | 19/10/2017

The headline stories of the threat landscape in 2016 were of the explosive growth of ransomware, the massive email campaigns that distributed it to organisations of all sizes, and the exponential increase in email fraud attacks that have cost businesses billions in theft, disruption and reputational damage. Criminals are now targeting individuals, not companies or infrastructure. See key findings from our Human Factor Report.

Download this now


Strengthen Your Defenses Against Cybercrime
By Mimecast | 23/8/2017

As organisations learn to navigate life in the cloud, they need a new level of preparedness. Read this report to find out more about cyber resilience planning for email.

Download this now

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release