Attacks Whitepapers


Sort by: Date | Company | Title


Threat intelligence: Shellshock
By F5 Networks | 17/4/2015
Information on the security threat “Shellshock” and its mitigation.
Download this now


Before the breach
By IBM Australia | 26/3/2015
Threat intelligence uses the symptoms of an attack to foster an understanding of who the attackers are and what their motives and capabilities may be--offering the insight necessary to develop a proactive stance and thwart attackers.
Download this now


Gaining the upper hand in today's cyber security battle
By IBM Australia | 26/3/2015
Threat intelligence transforms the technical analysis required to identify the symptoms of a cyber attack - such as malware and security events - into an understanding of who the attackers are and what their motives and capabilities may be.
Download this now


Responding to - and recovering from - sophisticated security attacks
By IBM Australia | 26/3/2015
We all know how major security incidents can affect a company’s data, networks and corporate brand. We also know that sophisticated attacks, designed to gain continuous access to critical information or to cause damage in critical infrastructure, are becoming more severe, more frequent and more costly. But what can you do about it? The IBM white paper “Responding to - and recovering from - sophisticated security attacks” details four proactive steps that you can - and should - take now to help keep your organisation safe: prioritise your business objectives and set your risk tolerance; protect your organisation with a proactive security plan; prepare your response to the inevitable sophisticated attack and promote and support a culture of security awareness. Read the white paper to learn how to help keep your organisation safe from sophisticated security attacks and find out how IBM can help.
Download this now


2014 IBM X-Force Threat Intelligence Report 4Q 2014
By IBM Australia | 26/3/2015
This quarterly report from the IBM X-Force research and development team provides a closer look at today’s security risks – from new threats arising from within the Internet of Things, to the sources of malware and botnet infections.
Download this now


Infographic: Phishing. Who’s being targeted?
By Symantec | 14/10/2014
Targeted phishing attacks are affecting the security in businesses of all sizes. This helpful infographic shows who’s at risk, why data breaches are growing and the layers of defence you can have. • 1 in 2 phishing attacks have been targeted at large enterprises • Attacks on businesses with 1 to 250 employees have increased in the last two years • Most mobile vulnerabilities are on the Apple iOS platform
Download this now


Security 101
By F5 Networks | 11/7/2014
Security 101: Industry experts have long debated which is a better defense mechanism in defending against Internet based attacks: a web application firewall (WAF) or an intrusion detection or prevention system (IDS/IPS),we define the differences. Read More
Download this now


5 Keys to Preventing Advanced Attacks
By Palo Alto Networks | 14/11/2013
It is no secret that modern information-based attacks have become increasingly sophisticated and common, and these advanced threats present one of the most important challenges facing network security teams today. In this whitepaper, we look at some of the most important criteria to consider when architecting your defences against advanced attacks and modern malware.
Download this now