Member’s Login

Forgot Password  |  Create an account
Resource Centre

White Papers

State of Cybersecurity: Implications for 2015 Published on - Wednesday, April 29th, 2015 As cybersecurity incidents increase it is important to examine the issues surrounding them. ISACA and RSA Conference explored 2014’s cybersecurity issues and look at the variables contributing to the impact that cyberattacks are having on enterprises. Download
Verizon 2015 Data Breach Investigations Report Published on - Tuesday, April 14th, 2015 The 2015 Data Breach Investigations Report (DBiR) continues the tradition of change with additions that we hope will help paint the clearest picture yet of the threats, vulnerabilities, and actions that lead to security incidents, as well as how they impact organisations suffering them. Download
Continuous Compliance and Next Generation NAC: A Cornerstone Defense for Dynamic Endpoint Intelligence and Risk Mitigation Published on - Monday, April 13th, 2015 Conventional network security practices are becoming less effective. Individual security solutions such as antivirus (AV), encryption, DLP and IPS, and practices such as vulnerability assessment (VA) and mobile device management (MDM) are effective at their specific objectives. Download
Understanding Digital Intelligence and the Norms That Might Govern It Published on - Monday, March 30th, 2015 This paper describes the nature of digital intelligence. It looks at the dynamic interaction between demands from government and law enforcement for digital intelligence, and at the new possibilities that digital technology has opened up for meeting such demands. Download
State of the Web 2015: Vulnerability Report Published on - Friday, March 27th, 2015 This report is based on an extensive exercise undertaken by Menlo Security which scanned the Alexa top one million sites to see which sites were vulnerable and/or compromised. In total, the team scanned over 1.75 million URLs representing over 750,000 unique domains. Download
The Healthcare Internet of Things: Rewards and Risks Published on - Friday, March 27th, 2015 This is the second report in a series by the Atlantic Council in partnership with Intel Security to examine the rewards and risks of key emerging technologies and the importance of getting security right in order to unlock technologies’ true potential. Download
Internet of Things: Security and Privacy in Connected World Published on - Tuesday, March 24th, 2015 There appears to be an agreement that companies developing IoT products should implement reasonable security. What constitutes reasonable security for a given device will depend on a number of factors, including the amount and sensitivity of data collected and the costs of remedying the security vulnerabilities. Download
IBM X-Force Threat Intelligence Quarterly, 1Q 2015 Published on - Wednesday, March 18th, 2015 Breaches and security incidents were being announced so rapidly in 2014 that many struggled to keep up. Explore the latest security trends—from “designer vulns” to mutations in malware— based on 2014 year-end data and ongoing research. Download
The Security Impact of Mobile Device Use by Employees Published on - Wednesday, March 18th, 2015 The Security Impact of Mobile Device Use by Employees study examines employees’ perceptions about the secure use of mobile devices to access corporate information. It surveyed 709 individuals in the US who work in such areas as sales, finance and accounting, corporate IT, business operations and other functions. Download
Verizon 2015: PCI Compliance Report Published on - Wednesday, March 11th, 2015 The scale of recent payment-data breaches makes it clear that many organizations’ security measures aren’t slowing attackers down. This year’s PCI Compliance Report takes a critical look at whether the problem is a result of current security standards or the way compliance is being approached, and what organizations can do to better manage the risk. Download
Internet of Things: Risk and Value Considerations Published on - Tuesday, March 10th, 2015 The Internet of Things (IoT) revolution has the potential to be staggeringly transformational and, at the same time, highly disruptive to business. It is imperative that assurance, security and governance professionals take notice of the IoT trend because it has the potential to redefine the risk equation within many enterprises. Download
Automation in the Incident Response Process: Creating an Effective Long-Term Plan Published on - Tuesday, March 10th, 2015 With the right resources in place, attackers can be detected more accurately and efficiently, mitigating damage and data loss from inevitable network attacks. This white paper from SANS Institute presents a proper process and procedure for incident response that includes the use of automation tools. Download
HP Cyber Risk Report 2015 Published on - Tuesday, February 24th, 2015 In this report HP provides a broad view of the 2014 threat landscape, ranging from industry-wide data down to a focused look at different techs, including open source, mobile, and IOT. The goal of this Report is to provide security info leading to a better understanding of the threat landscape. Download
Marble Labs Mobile Threat Report, February 2015 Published on - Thursday, February 5th, 2015 After analysing over 1 million apps available on the North American versions of the Apple App Store or Google Play, that do not require a jailbroken or rooted device, Marble Labs has determined that more than 40 percent of the dangerous apps on these stores are developed by publishers based in the United States. Download
Evaluating the Exploit Skills of Malware Groups Published on - Wednesday, February 4th, 2015 It is common belief that APT groups are masters of exploitation. If anyone, they should know everything about the art of exploitation, right? Our research into the real world uses of the CVE-2014-1761 vulnerability shows that this is far from being true. Download
The Challenge of Preventing Browser-Borne Malware Published on - Wednesday, February 4th, 2015 In this study, we define web-borne malware as malware that attacks and infiltrates a user’s insecure browser. The recent JPMorgan Chase data breach that affected 76 million households and 7 million small businesses is an example of hackers targeting an employee’s web habits. Download
LOOKOUT 2014 MOBILE THREAT REPORT Published on - Friday, January 16th, 2015 In 2013 the notable trend in mobile security was the geographic diversification of mobile threats. In 2014 this pattern of regional adaptation continued, but the new and noteworthy mobile security trend this year has been the emergence of new mobile threat tactics (such as ransomware) and an increase in threat sophistication. Download
2015 State of the Endpoint Report: User-Centric Risk Published on - Friday, January 16th, 2015 The biggest problem identified in this year’s 2015 State of Endpoint Report: User- Centric Risk research is the negligent or careless employee with multiple mobile devices using commercial cloud apps and working outside the office. Download
Cloud Adoption Practices & Priorities Survey Report Published on - Tuesday, January 13th, 2015 In the 2014 Cloud Adoption Practices and Priorities (CAPP) survey, the Cloud Security Alliance sought to understand how IT organizations approach procurement and security for cloud services and how they perceive and manage employee-led cloud adoption. Download
A No-Budget Approach to the Containment of Malware Traffic Published on - Monday, January 12th, 2015 Many small/medium sized businesses have little budget for Information Security yet face the same malware threat as larger organizations. In Information Security, we say that prevention is ideal and detection is necessary but what comes after detection? Download
Fortifying for the Future: Insights from the 2014 IBM Chief Information Security Officer Assessment Published on - Tuesday, December 16th, 2014 The 2014 edition of the CISO Assessment evaluates the current state of security leadership and what leaders expect to face in the next three to five years. Security leaders are in the midst of an evolution. Download
Underground Hacker Markets Are Booming Published on - Tuesday, December 16th, 2014 The underground hacker markets are booming with counterfeit documents, premiere credit cards, hacker tutorials and 100% satisfaction guarantees. The research found that the markets are booming with counterfeit documents to further enable fraud, including new identity kits, passports, utility bills etc. Download
Vulnerability Under Attack: Shedding Light on Growing Attack Surface Published on - Wednesday, December 3rd, 2014 Trend Micro's latest quarterly security roundup report, "Vulnerabilities Under Attack: Shedding Light on the Growing Attack Surface" reveals web platform and mobile app vulnerabilities that have broadened significantly. Download
Regin: Top-tier Espionage Tool Enables Stealthy Surveillance Published on - Tuesday, November 25th, 2014 Regin is an old, multi-purpose data collection tool. Symantec first began looking into this threat in the fall of 2013. Multiple versions of Regin were found in the wild, targeting several corporations, institutions, academics, and individuals. Download
IT Threat Evolution Q3, 2014: Kaspersky Lab Published on - Friday, November 21st, 2014 Kaspersky Lab released its third quarterly IT Threat Report for 2014, finding that over a billion malicious attacks were blocked during the quarter, and one third of Web attacks were carried out using malicious Web resources hosted in the United States. Download

Subscribe to our newsletter for all the latest updates and special offers.

Click Here To view archive additions

Older Entries

Monday, April 14th, 2014 02:55:00 PM Heartbleed - Bruce Schneier, CTO
Sunday, April 27th, 2014 09:10:00 AM Heartbleed FAQs - Richard Henderson, Security Strategist FortiGuard Labs
View All