Member’s Login

Forgot Password  |  Create an account
Resource Centre

White Papers

2014 Emulex Visibility Survey Published on - Wednesday, July 23rd, 2014 The proliferation of data on enterprise networks continues to increase with the rising demand for such technologies as virtualization, SDN, and high-performance computing, as well as a growing dependency on mobility across the workforce. Couple this with a sophisticated cyber attack landscape, and it’s all IT can do to keep up with network activity. Download
Cyber Defense Maturity Report 2014 Published on - Wednesday, July 16th, 2014 This survey, sponsored by ForeScout, illustrates the nature and extent of the security threats and defense maturity arrayed against organizations in the finance, manufacturing, healthcare, retail and education sectors in Austria, Germany, Switzerland (DACH region), the UK and the USA. Download
Critical Infrastructure: Security Preparedness and Maturity Published on - Monday, July 14th, 2014 New research from Unisys Corporation finds alarming gaps in the security of the world’s critical infrastructure. Nearly 70 percent of companies surveyed that are responsible for the world’s power, water and other critical functions have reported at least one security breach that led to the loss of confidential information or disruption of operations in the past 12 months: Ponemon Institute. Download
Securing the Next Generation Digital Enterprise Published on - Friday, July 4th, 2014 Booz, Allen and Hamilton wrote this wonderful white paper basis the discoveries they made through information gathering on how to secure the Digital Enterprise. Due to a widespread transformation in enterprise information management model, and adoption of Digital Technologies as the mode of conducting business, it is important to understand how we take care of our information assets. Download
US cybercrime: Rising risks, reduced readiness Published on - Monday, June 30th, 2014 As cybersecurity incidents multiply in frequency and cost, the cybersecurity programs of US organizations do not rival the persistence and technological prowess of their cyber adversaries. Organizations do not adequately address employee and insider vulnerabilities, nor do they assess the security practices of third-party partners and supply chains. Download
McAfee Labs Mobile Malware Threat Report Published on - Wednesday, June 25th, 2014 Based on its popularity, enterprising cybercriminals developed hundreds of Flappy Bird clones containing malware. McAfee Labs sampled 300 of those clones and found that almost 80% of them contained malware. Some of the behaviour we found includes making calls without the user’s permission; sending, recording, and receiving SMS messages. Download
Net Losses: Estimating the Global Cost of Cybercrime Published on - Friday, June 13th, 2014 Cybercrime is a growth industry. The returns are great, and the risks are low. We estimate that the likely annual cost to the global economy from cybercrime is more than $400 billion.1 A conservative estimate would be $375 billion in losses, while the maximum could be as much as $575 billion. Download
Broken Trust: Exposing the Malicious Use of Digital Certificates & Cryptographic Keys Published on - Tuesday, June 3rd, 2014 Published jointly by iSIGHT Partners Research and Venafi, this white paper focuses on the significant rise in cybercriminals exploiting vulnerable cryptographic keys and digital certificates. By breaking the trust established between networked devices hackers are stealing identities, gaining access to intellectual property and exploiting confidential information for personal gain. Download
2014 US State of Cybercrime Survey Published on - Friday, May 30th, 2014 The findings of the 2014 U.S. State of Cybercrime Survey reveal that while the number of cybercrime incidents and the monetary losses associated with them continue to rise, most organizations’ cybersecurity capabilities do not rival the persistence and tech skills of their cyber adversaries. The survey is done by PwC, CSO magazine, the CERT Division of the Software Engineering Institute CMU, and the U.S. Secret Service. Download
10 Steps for Early Incident Detection Published on - Thursday, May 29th, 2014 Information security is only as good as the response it generates. A good, strong response is critical to deal- ing with a security incident efficiently, minimising the impact on the organisation and projecting a positive image of the organisation’s security posture. Ensuring this strong response requires the organization to detect a security incident early. This is a Tripwire White Paper on Incident Detection. Download
The Role of Intelligence in Network Defence Published on - Friday, May 23rd, 2014 The paper deals with understanding intelligence requirements, risks to an organisation’s data, differentiating between threat intelligence vendors and implementing the intelligence feed to detect and investigate nefarious activity. The purpose of this white paper is to educate the reader on how threat intelligence can add substantial value to the security of a computer network as part of a wider cyber security strategy. Download
Microsoft Security Intelligence Report Published on - Monday, May 12th, 2014 The Microsoft Security Intelligence Report (SIR) analyses the threat landscape of exploits, vulnerabilities, and malware using data from Internet services and over 600 million computers worldwide. Threat awareness can help you protect your organization, software, and people. Download
Mobile Threat Report Published on - Tuesday, May 6th, 2014 This Mobile Threat Report is based on mobile application data gathered during the period of 1st January to 31st March 2014. The collected samples and data are scanned by multiple internal analysis systems, as well as undergoing in-depth investigation by F-Secure Labs’ Threat Research Analysts. Download
Malware Trend Report, Q1 2014 Published on - Tuesday, May 6th, 2014 This is the first trend report from RedSocks Malware Research Labs. With this report we hope to provide a deeper insight into the trends we see in the Malware that we process. In this report we will look at data collected during the 1st quarter of 2014. Download
Bit9 Convergence of Security and Compliance Published on - Thursday, May 1st, 2014 IT security and compliance professionals are under constant pressure to ensure ongoing compliance with industry regulations. This white paper defines potential compliance and security gaps, identifies what effect these gaps can have on your organization, and how a positive solution can close these gaps to ensure the security of servers and endpoints Download
Gartner Magic Quadrant for Enterprise Network Firewalls Published on - Tuesday, April 29th, 2014 "Next generation" capability has been achieved by the leading products in the network firewall market, and competitors are struggling to keep the gap from widening too much. Buyers must consider their own operational realities and the burden of switching. Download
Context Information Security: Is MDM the Solution to BYOD? Published on - Sunday, April 27th, 2014 Managing BYOD within an enterprise environment poses a serious challenge for IT security pros. Organisations seeking to take advantage of the numerous business benefits offered by BYOD, must strike a delicate balance between security requirements and the need to create a BYOD environment that users will be happy to utilise. Download
Deloitte White Paper: Exploring Strategic Risk Published on - Sunday, April 27th, 2014 Managing risk effectively has always been a touchstone of the most successful companies. But in today’s risk-filled business environment, it can be hard for executives to have confidence that their plans and strategies will play out as expected. A big reason is that strategic risks. That is just one of the reasons managing strategic risk has become a high priority for many executives. Download
ISACA: Cloud Governance - Questions Board of Directors Need to Ask Published on - Sunday, April 27th, 2014 Like any investment, cloud projects should be guided by the board of directors to ensure value creation. When evaluating cloud initiatives, board members should ask their management teams specific questions, the answers to which will determine whether cloud services will have a positive and sustainable impact on enterprise goals. Download
ISACA: Generating Value from Big Data Analytics Published on - Sunday, April 27th, 2014 Many enterprises are moving quickly to adopt “big data analytics”. As this trend of adoption continues, information security, risk and audit professionals are likely to become increasingly aware of the possible technical and operational risk that may arise as a result of adoption in their enterprises. Download
Forrester Research: Secure File Sharing And Collaboration In The Enterprise Published on - Sunday, April 27th, 2014 Today’s anytime, anywhere information workforce is accustomed to working on multiple devices and requires regular communication and collaboration with peers and business partners in order to do their jobs. Unfortunately, easy and common methods for meeting these needs carry the risk of accidental data disclosure. Download
Nine Reasons for Ensuring PCI Compliance Published on - Sunday, April 27th, 2014 As a retail security professional, you are challenged to maintain compliance with the PCI Data Security Standard (DSS) and validate your systems. If you deploy endpoint protection based on detecting known malware you will find that it is ineffective in stopping advanced threats such as zero-day and targeted attacks. Download

Subscribe to our newsletter for all the latest updates and special offers.

Click Here To view archive additions

Older Entries

Monday, April 14th, 2014 02:55:00 PM Heartbleed - Bruce Schneier, CTO
Sunday, April 27th, 2014 09:10:00 AM Heartbleed FAQs - Richard Henderson, Security Strategist FortiGuard Labs
View All