Security News

Whitepaper – Threat Intelligence Platforms: Open Source vs. Commercial
2019-08-05 03:45

As a member of a maturing security team evaluating threat intelligence platforms (TIPs), you may be asking yourself whether you should use an open source solution like Malware Information Sharing...

Whitepaper: Building a Threat Intelligence Programme (UK)
2019-07-30 10:49

ThreatConnect surveyed more than 350 cybersecurity decision makers in the UK. The result: Building a Threat Intelligence Programme discusses research findings on best practices and impact of those...

Whitepaper: Know your enemy, know your risk
2019-07-09 13:00

Understanding the risks to your most sensitive data begins with understanding the mindset of the hackers attacking it. Knowing why they do it can help identify where and how they will attack. This...

Whitepaper: Maturing a Threat Intelligence Program
2019-06-13 04:15

Whether you are getting started with TI or seeking to expand an existing program, the Threat Intelligence Maturity Model provides a systematic guide to help you understand where your organization...

Whitepaper: Third-Party Risk to the Nth Degree
2019-04-23 11:03

For many, cost-effective scalability usually means outsourcing some or all of your business functions to a complex web of third-party vendors. The Third-Party Risk to the Nth Degree whitepaper...

Whitepaper: The next generation of connected experience
2018-09-13 04:30

The smart home concept started out as a dream, but it turned into a mess. IoT enthusiasts were so excited that they can connect every possible item to the internet, that they forgot to ask if they...

Whitepaper: Managing users and authentication with on-premises Active Directory for O365
2018-06-28 17:48

The move to Office 365 (O365) requires IT departments to make some tough decisions regarding how and where to manage users and authentication. To confuse the picture further, there are many...

Whitepaper: Future-proofing your password policy
2018-05-23 13:25

Users are accumulating more and more passwords, and many of the recent breaches are the direct result of their compromise. As hackers find new ways to exploit password-protected systems, widely...

Whitepaper: DNS Threat Intelligence vs. AI Network Security
2018-04-24 13:52

The Domain Name System (DNS) turns a user-friendly domain name into an IP address that computers use to identify each other. DNS is unencrypted by default. Most security vendors still heavily rely...

Whitepaper: What is GDPR and what does your organisation need to do to comply?
2018-02-21 14:46

On May 25, the General Data Protection Regulation will bring sweeping changes to data security in the European Union. If your organisation collects personal data or behavioural information from...