Australian businesses face an eye-opening transition to the new notifiable data breaches (NDB) scheme as the new legislation requires companies to notify the Privacy Commissioner, and any affected individuals, of any data breach that meets the legislative parameters within 30 days.
This white paper summarises what you need to know about the legislation, how it will affect Australian businesses, as well as some tips for how to be prepared and how best to respond publicly to any potential data breach.
Download the report to find out more.
This whitepaper looks at how to demonstrate the potential return on investment (ROI) of an enterprise-class advanced security solution to non-technical executives with a with a checklist of the key points you need to emphasise for a positive outcome. Your executives need to know the challenges you face and the risk if you don’t find solutions.
Conventional security detects threats too late (if at all), and resolves them too slowly. It gives security teams a fragmented, incomplete view into what’s going on in their network. It’s passive and blind to broader threat trends. And it reacts too slowly to new threats and changing conditions. Discover the 10 components to re-imagining security with adaptive defence.
While we have seen modest gains in organisations’ ability to attack the security gap, advanced (and not-so advanced) threat actors continue to evolve their tactics to find a way through it. This whitepaper looks at the developments for 2015 and how these developments paint a threat landscape that is more complex than ever.
The FireEye Advanced Threat Report for the second half of 2011 is based on research and trend analysis conducted by the FireEye Malware Intelligence Labs. This report provides an overview of advanced targeted attacks in the second half of 2011 and was developed to provide insights into the current threat landscape, evolving advanced persistent threat (APT) tactics, and the level of infiltration seen in organisational networks today. This is not a typical threat report with just tallies of the millions of well-known malware or billions of spam messages. Read more.
Defending against next generation threats requires a strategy that moves beyond signatures and behavioural heuristics. Over 95% of businesses unknowingly host compromised endpoints, despite their use of traditional next-generation firewalls, intrusion prevention systems (IPS), antivirus and Web gateways. Read more.
Over 95% of businesses unknowingly host compromised endpoints, despite their use of firewalls, intrusion prevention systems (IPS), antivirus and Web gateways.1 Today’s attacks look new and unknown to signature-based tools because the attacks employ advanced malware and zero-day vulnerabilities. To regain the upper hand against next-generation attacks, enterprises must turn to true next-generation protection: signature-less, proactive and real time. Read on.
There's been a rapid shift from broad, scattershot attacks to advanced target attacks that have had serious consequences for victim organisations. The increased use of spear phishing is directly related to the fact that it works, as traditional security defences simply do not stop these types of attacks. This paper provides a detailed look at how spear phishing is used within advanced attacks and the key capabilities organisations need in order to effectively combat these emerging and evolving threats.