Security News

Whitepaper: Maturing a Threat Intelligence Program
2019-06-13 04:15

Whether you are getting started with TI or seeking to expand an existing program, the Threat Intelligence Maturity Model provides a systematic guide to help you understand where your organization...

Whitepaper: Third-Party Risk to the Nth Degree
2019-04-23 11:03

For many, cost-effective scalability usually means outsourcing some or all of your business functions to a complex web of third-party vendors. The Third-Party Risk to the Nth Degree whitepaper...

Whitepaper: The next generation of connected experience
2018-09-13 04:30

The smart home concept started out as a dream, but it turned into a mess. IoT enthusiasts were so excited that they can connect every possible item to the internet, that they forgot to ask if they...

Whitepaper: Managing users and authentication with on-premises Active Directory for O365
2018-06-28 17:48

The move to Office 365 (O365) requires IT departments to make some tough decisions regarding how and where to manage users and authentication. To confuse the picture further, there are many...

Whitepaper: Future-proofing your password policy
2018-05-23 13:25

Users are accumulating more and more passwords, and many of the recent breaches are the direct result of their compromise. As hackers find new ways to exploit password-protected systems, widely...

Whitepaper: DNS Threat Intelligence vs. AI Network Security
2018-04-24 13:52

The Domain Name System (DNS) turns a user-friendly domain name into an IP address that computers use to identify each other. DNS is unencrypted by default. Most security vendors still heavily rely...

Whitepaper: What is GDPR and what does your organisation need to do to comply?
2018-02-21 14:46

On May 25, the General Data Protection Regulation will bring sweeping changes to data security in the European Union. If your organisation collects personal data or behavioural information from...

Whitepaper: Top 20 cyber attacks on ICS
2017-12-13 12:30

The technique for evaluating the risk of cyber-sabotage of industrial processes are well understood by those skilled in the art. Essentially, such risk assessments evaluate a typically large...

Whitepaper: Understanding pulse wave DDoS attacks (Help Net Security)
2017-09-01 11:50

Pulse wave DDoS is a new attack tactic, designed to double the botnet’s output and exploit soft spots in “appliance first cloud second” hybrid mitigation solutions. Comprised of a series of...

Whitepaper: Eight key pressures on security operations (Help Net Security)
2017-07-20 23:00

Security operations have come under increasing pressure from well-funded attackers armed with news tactics, tools and skills. As a result of this, there is additional scrutiny, micromanagement and...