Member’s Login

Forgot Password  |  Create an account
Resource Centre

White Papers

Intelligence-aware Threat Detection and Mitigation Published on - Thursday, November 20th, 2014 In the face of growing quantities of data that must be analysed to protect organisations from advanced security attacks and the current shortage of skilled IT security personnel to manage the task, organizations must focus on constructing a robust process for rapid threat detection, incident response, and mitigation. Download
Cost of CyberCrime: Ponemon Institute & HP Research Published on - Wednesday, November 19th, 2014 The Cost of Cyber Crime study was first conducted by Ponemon Institute in the United States five years ago. This is the third year we conducted the study in the United Kingdom, Germany, Australia and Japan. Last year we expanded the research to France and this year we added the Russian Federation. The findings from 7 countries are presented in separate reports. Download
Risks and Rewards of Connected Devices: ISACA Report Published on - Thursday, November 13th, 2014 SACA’s 2014 IT Risk/Reward Barometer explores the mindsets and behaviours of both consumers and IT/business professionals, looking specifically at their awareness, concerns and reactions to issues related to connected devices. Download
Breaking Through the Value Ceiling Published on - Monday, November 10th, 2014 Technologies implemented to meet operational needs bring tangible benefits to an organization with focused, tactical functions. These tools bring value to organizations due to the focus on the specific business challenge at hand and most often help achieve goals at the operations level. However, certain processes need to lead to greater enterprise value. Download
A Glance Into the Psychology of Facebook Scam Victims: Who is Still Yearning to See Who Viewed Their Profile? Published on - Thursday, November 6th, 2014 A Bitdefender study on over 850,000 Facebook scams revealed the top five bait categories that affect users worldwide through malware, spam and fraudulent attacks. The biggest vulnerabilities appear because of general human dispositions that may hit any user at one point in his life. Download
Get Ahead of Cybercrime: EY's Global Information Security Survey 2014 Published on - Tuesday, November 4th, 2014 The EY Annual Information Security Survey 2014 tells that more organisations are looking beyond the foundations in their approach to cyber security. These organisations are adapting their cyber security measures to changes in their business strategy and operations and to changes in the external business environment. Download
Consumer Security Risk Survey 2014: Multi-device Threats in a Multi-device World Published on - Monday, November 3rd, 2014 According to a survey carried out jointly by B2B International and Kaspersky Lab, 13% of Internet users do not believe that cyber-attacks are real. They feel that the threat is exaggerated by security companies. However, this leaves them without any protection against a risk that threatens their data and virtual lives every day. Download
Operation SMN: Axiom Threat Actor Group Report Published on - Wednesday, October 29th, 2014 Axiom is responsible for directing highly sophisticated cyber espionage operations against numerous Fortune 500 companies, journalists, environmental groups, pro-democracy groups, software companies, academic institutions, and government agencies worldwide for at least the last six years. Download
The Importance of Senior Executive Involvement in Breach Response Published on - Tuesday, October 28th, 2014 Ponemon Institute presents the results of The Importance of Senior Executive Involvement in Breach Response, sponsored by HP Enterprise Security Services. It surveyed 495 senior executives in the US and UK to understand their perspective about the importance of executive and board level involvement in achieving an effective and strategic incident response process. Download
Global IT Security Risks Survey - Virtualization: Kespersky Lab Published on - Wednesday, October 22nd, 2014 Of almost 45,000 survey respondents worldwide, 14% cited securing virtualized infrastructure as one of the top thee most important information security priorities for the next 12 months. This was cited most often among Enterprise organizations, 21% of which selected securing virtualized infra as one of their most important priorities. Download
An Advanced and Integrated Approach to Managed Enterprise Network Security Published on - Tuesday, October 21st, 2014 New research from Frost & Sullivan shows many companies are struggling to keep their networks secure against rapidly evolving cyber threats. Despite increasingly sophisticated attacks and rising complexity in the technological and regulatory landscapes, companies still typically rely on outdated methods to keep data secure. Download
Senior Cyber Leadership: Why a Technically Competent Cyber Workforce Is Not Enough - A CSFI White Paper Published on - Friday, October 17th, 2014 This report suggests that while significant and necessary emphasis has been placed on technical skills needed within the cyber workforce, little attention has been given to the people that will lead the future workforce. It is leadership that must develop sound strategy and manage adequately skilled resources to mitigate the cyber threat. Download
2013 Cost of Cyber Crime Study: Global Report Published on - Friday, October 17th, 2014 Sponsored by HP, Ponemon Research has released the 2013 Cost of Cyber Crime Study: Global Report. This report is based on a representative sample of 234 organizations in the following six countries: United States, United Kingdom, Australia, Germany, France and Japan. Download
Web Application Attack Report 5th Edition Published on - Monday, October 13th, 2014 The report, which is based on the analysis of 99 applications over a period of nine months (August 1, 2013 - April 30, 2014), determined that WordPress is the most targeted content management system (CMS). In fact, WordPress websites were attacked 24.1% more than sites running on all other CMS platforms combined. Download
Senior Cyber Leadership: Why a Technically Competent Cyber Workforce Is Not Enough Published on - Saturday, October 11th, 2014 This report suggests that while significant and necessary emphasis has been placed on technical skills needed within the cyber workforce, little attention has been given to the people that will lead the future workforce. It is leadership that must develop sound strategy and manage adequately skilled resources to mitigate the cyber threat. Download
Cybersecurity Workforce Competencies: Preparing Tomorrow’s Risk-Ready Professionals Published on - Friday, October 10th, 2014 This report is based on the findings from an industry roundtable Contents with cybersecurity professionals and talent development leaders, co-hosted by University of Phoenix and the (ISC)2 Foundation. The objective of the session was to identify actionable recommendations for key stakeholders to better prepare students to enter careers in cybersecurity. Download
Beyond Good Intensions: 2014 Information Risk Maturity Index Published on - Tuesday, September 30th, 2014 Commissioned by Iron Mountain, PwC has unveiled the first combined Information Risk Maturity Index, based on interviews with 1800 business leaders in Europe and North America. At 58.8 out of a possible maximum score of 100 the combined index seems ‒ on initial examination ‒ to be disappointingly low. Download
Cloud Usage: Risks and Opportunity Report 2014 Published on - Tuesday, September 23rd, 2014 Beyond raising awareness around cloud service risk, the findings of this Report are intended to provide usage intelligence that helps IT, security, and business decision-makers take action in their organizations – from consolidating and standardizing on the most secure and enterprise-ready cloud services, to knowing what policies will have the most impact. Download
Annual Incident Reports 2013: Analysis of Article 13a Annual Incident Reports Published on - Wednesday, September 17th, 2014 Every year, ENISA publishes an annual report about significant incidents in the electronic communications sector, which are reported to it by the National Regulatory Authorities (NRAs) of the different EU Member States. This report covers the incidents that occurred in 2013 and it gives an aggregated analysis of the incident reports about severe outages across the EU. Download
Six Rogue Mobile Apps and How can They Damage Your Business Published on - Thursday, September 4th, 2014 Along with the millions of legitimate apps, “rogue”mobile apps also co-exist in many app storefronts. Rogue mobile apps can be unauthorized apps that are sold or distributed on unauthorized storefronts, or apps that demonstrate behaviors outside of how the legitimate app was intended to function. Download
PandaLabs Quarterly Report for Q1 2014 Published on - Wednesday, September 3rd, 2014 Panda Security has come up with its latest findings of the PandaLabs Quarterly Report for Q1 2014. The main conclusions of the study include the fact that malware creation has broken all records during this period, with a figure of more than 15 million new samples, and more than 160,000 new samples appearing every day. Download
The Mystery of North Korea’s Cyber Threat Landscape Published on - Tuesday, September 2nd, 2014 The DPR Korea is a unique country with an unconventional technology infra. Due to North Korea’s global interactions, its cyber warfare capabilities are of particular interest to the U.S. Its asymmetric arsenal includes an active cyber warfare capability. While one would expect the regime’s digital infrastructure to also suffer from ageing, these factors do not take away from their abilities to wage cyber warfare. Download
You Are The Target - But You Don't Have to be With Effective Authentication Published on - Tuesday, August 5th, 2014 Any size organization can be a target. Password-only protection is simply too risky. Stolen passwords are responsible for major thefts of records.This paper will show how the legal and threat environment—combined with BYOD and cost factors—make multi-factor, risk- based authentication the logical approach to solving the problem. Case studies are used to illustrate. Download
App Reputation Report Published on - Tuesday, August 5th, 2014 The Appthority App Reputation Report for summer 2014 provides an overview of the security risks behind the most popular mobile apps. Appthority App Risk Management Service analyzed the behaviors of Top 400 mobile apps: the top 100 free apps and 100 paid apps for both of the most popular mobile platforms, iOS and Android. Download
KPMG Cybercrime Survey 2014 Published on - Wednesday, July 23rd, 2014 Cybercrime continues to remain a tough challenge for organisations. There has been a significant increase in the number of cybercrime attacks prompting organisations to stay alert, seek means to fight cybercrime threats. KPMG has been on the forefront to help ensure strong security defense mechanisms. KPMG in India has conducted the ‘Cybercrime Survey 2014’. Download

Subscribe to our newsletter for all the latest updates and special offers.

Click Here To view archive additions

Older Entries

Monday, April 14th, 2014 02:55:00 PM Heartbleed - Bruce Schneier, CTO
Sunday, April 27th, 2014 09:10:00 AM Heartbleed FAQs - Richard Henderson, Security Strategist FortiGuard Labs
View All