White Papers

Featured White Papers



CSO Security Buyers Guide 2017
By CSO | 11/8/2017

The pressure is on to be secure. Are you feeling the squeeze?

If you spent the past few years coming to grips with the true extent of the threat from malware, ransomware and nation-state hackers, be prepared for the rest of 2017 to play out rather differently. Sure, the threats are still there and growing but as Australia prepares to join the ranks of the nations with mandatory breach reporting regimes, you are now operating under the microscope and on a deadline.

Download this now


Translating Security Leadership into Board Value
By RSA | 12/5/2017

What Boards Want to Know and CISOs Need to Say

Seven years ago in the SBIC report Bridging the CISO-CEO Divide, we explored the best practices security leaders could use to communicate more effectively with their C􀀁Os. CISOs were at a crossroads and just beginning to take a seat at the executive table. We provided recommendations from global leaders about ways CISOs could embrace their growing leadership role, build trust with the executive leadership team and earn the confidence of their C􀀁O. We discussed how harting a new course based on a strategic, risk-based approach to information security would drive clear business value.

Download this now


IDC Infobrief: Unleash Business Agility on Cloud
By Lenovo | 1/8/2017

Cloud is now a vital enterprise digital platform of choice to achieve agility. This IDC InfoBrief throws the spotlight on the latest developments and the key factors for consideration to ensure cloud success.

Download this now


Vulnerability Management Buyer’s Guide
By Rapid 7 | 1/3/2017

Exploiting weaknesses in browsers, operating systems, and other third-party software to infect end user systems is a common initial step for security attacks and breaches. Finding and fixing these vulnerabilities before the attackers can take advantage of them is a proactive defensive measure that is an essential part of any security program.

Overview of VM Program: Prepare Assess Remediate Track Progress

Download this now


Who Needs Malware?
By CrowdStrike | 13/7/2017

HOW ADVERSARIES USE FILELESS ATTACKS TO EVADE YOUR SECURITY

Download this now

Market Place