Malware Whitepapers


Sort by: Date | Company | Title


Everything You Need to Know About Cyber Threats But Were Too Afraid To Ask
By Dilignet | 20/4/2017

Boards of directors are too often kept in the dark about the security risks to their organisations. That’s what the Ponemon Institute discovered last June when they surveyed members of the board of directors and IT security experts from the same companies.

The Ponemon researchers found that 30% of directors acknowledge that they don’t understand the risks that their organisation faces in security matters. Yet more than 50% of the IT security experts believe that the directors who sit on the boards of their companies don’t understand the security environment that they are working in, or the risks it represents. Read this today..

Download this now


Exploits. Intercepted.
By Sophos | 12/12/2016

Exploits are one of the main techniques used by cybercriminals to spread malware. They take advantage of weaknesses in legitimate software products like Flash and Microsoft Office to infect computers for their criminal ends. A single exploit can be used by myriad separate pieces of malware, all with different payloads.

Read this paper to learn more about exploits and how to stop them. It explores how exploits work, the exploit industry, what makes a good exploit in the eyes of the cybercriminals, and also how anti-exploit technology is a highly efficient and effective way to secure your organisation against advanced and unknown threats.

Download this now


Anatomy of a Hack Disrupted
By LogRhythm | 19/4/2016

With malware threats growing larger and more challenging to cope with each year, organisations can no longer rely on signature-based scanning of machines to identify these threats. Find out in this whitepaper how a comprehensive approach can ensure threats are automatically detected, isolated, identified, and disrupted well before any damage can be done.

Download this now


Responding to Today’s Advanced Threats
By LogRhythm | 19/4/2016

True enterprise security intelligence requires real-time awareness and an understanding of all data traversing the network. Find out in this product review how you can get visibility to detect threats to the organization and responding to them in a timely fashion.

Download this now


What solutions are Australian companies using to secure network endpoints?
By Webroot | 29/10/2015

Almost 50% of Australian security executives are concerned about the current state of their company’s security in dealing with advanced attacks. Find out in this infographic the survey results of how respondents feel about dealing with security breaches effectively.

Download this now


Advanced endpoint protection for dummies
By Palo Alto Networks | 26/10/2015

Cyberattacks have evolved to become much more complex, however the core techniques employed by malware are usually recycled and largely unchanged.

Find out how these targeted attacks affect companies in real world cases and why legacy solutions that focus on detection are insufficient to protect secure enterprise data. Included are also 10 preventative measures you can take to prevent a corporate security breach.

Download this now


The definitive guide for evaluating cybersecurity solutions
By Palo Alto Networks | 26/10/2015

Cyber criminals today are deploying sophisticated attacks on enterprises making the role of security professionals much more complex than ever before. Find out the 10 requirements your cybersecurity solution must meet to ensure secure application enablement at every location and how you should widen your RFP selection criteria when choosing a security provider.

Download this now


Designing a secure DNS architecture
By Infoblox | 19/10/2015

With globalisation growing, an inefficient DNS system that fails to support the influx of online visitors can be detrimental to business operations, revenue and online reputation. Find out what you must know to design a scalable and secure DNS architecture that not only satisfies your current business needs but also takes into account future expansion plans.

Download this now


High availability is not a luxury
By Arcserve | 31/8/2015

When markets are global, employees work around the clock and business is effectively always on, any interruption to application availability can quickly lead to lost revenue, lost productivity, lost brand value, and regulatory problems. Read on to learn how to deal with this type of existential threat.

Download this now


Stopping the next massive cyberattack
By Check Point Software Technologies | 28/4/2015

Cybercrime is now a leading menace of 21st century businesses. Perhaps even more unsettling, many cybercrime victims have been breached despite sizeable security investments and best-of-breed product deployments. For this reason, the sophistication of recent attacks has created a widespread sense of fear and distrust among consumers.

Download this now

Market Place