Your Search

White Papers


1 - 12 of 144 results


Items per page:

Sort By
  • 2017 Enterprise Phishing Resilience and...

    Company:   Cofense

    • C180

    In this report, you’ll learn: - How smart anti-phishing programs are lowering susceptibility to as low as 5% - The connection between reporting and ...

  • 2017 SSH Study - Reveals widespread...

    Company:   Venafi

    • D250

    A July 2017 survey of over 400 security professionals in the U.S., U.K. and Germany measured how well their organisations implemented security contro...

  • 2018 Cost of Insider Threats: Global...

    Company:   ObserveIT

    • N60

    According to The Ponemon Institute’s report, “2018 Cost of Insider Threats: Global Organisations,” the average cost of an insider threat annually is $...

  • 5 Critical Steps of a Complete Security...

    Company:   Tripwire

    • E50

    Tackling the challenge of finding and resolving risk in enterprise while demonstrating compliance.

  • A Risk-Aware Path To Cybersecurity...

    Company:   CMMI Institute

    • A100

    This white paper outlines the practical cybersecurity challenges in enterprises—challenges that are already acute and increase organizational and busi...

  • Advanced Protection and Threat...

    Company:   Nuvias

    • E140

    Kaspersky Lab products for business are designed for businesses of all sizes, from networks that comprise only a handful of workstations to the most c...

  • AI and the problem with Privacy

    Company:   Gemserv

    • H166

    This article discusses how the General Data Protection Regulation (GDPR), if properly enforced, can support organisations deploying artificial intelli...

  • An Adaptive and Layered Approach to...

    Company:   Bitdefender

    • D70

    The increased awareness around the need to fortify endpoint security is well-founded: Endpoints play a central role as the entry point through which ...

  • Application Layer Encryption:...

    Company:   Barracuda Networks

    • C150

    The security industry has extensively focused on protecting against malicious injection attacks like SQL injection and Cross-site Scripting. However,...

  • Applications Datasheet

    Company:   Securonix

    • L65
  • Attivo Networks’ high-fidelity...

    Company:   Attivo Networks

    • B110

    Deception technologies generally, and Attivo specifically, have seen a significant rise in market profile this year. One reason for the bump is the ty...

  • Auditing Cyber Security

    Company:   ISACA

    • A120,
    • A130

    This free white paper from ISACA, Auditing Cyber Security, highlights the need for these controls implemented as part of an overall framework and stra...

Media Partners

Health Service Journal CyberExchange SC Media CIO Applications Crest HTN Awards 2018 Computing Security Network Computing Ciso Ciso Ciso

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.