Hacking Whitepapers


Sort by: Date | Company | Title


Advanced persistent threats: Hijacking insider credentials
By Attachmate Australasia | 13/8/2014
Having an identity and access management solution is a must. Businesses cannot operate without them. However, this paper asks - are you sure the user credentials are being used by the correct individual? · Most organizations work hard to ensure compliance with corporate security policy but that doesn’t necessarily mean they’re protected · Managing identities is essential—but it can also lead to a false sense of security · Do the credentials and the behaviour make business sense? If you can’t interpret activity in the context of identity, you may be at risk
Download this now


Evolving Threats Demand; New Approaches To Security
By Akamai Technologies | 28/10/2013
As the world becomes increasingly hyper-connected, the opportunities for innovation and new business models are virtually limitless. However, with so much business-critical information at stake, the need to protect a company's IT assets is more important than ever before. This paper aims to profile the emerging players who comprise today’s emerging threat ecosystem; today's trends and the latest insights into the future.
Download this now