Whitepapers


Sort by: Date | Company | Title


Email Fraud Threat Report - The State of Email Fraud
By Sparx Solutions | 17/7/2018

Email fraud, also known as business email compromise (BEC), is one of today’s greatest cyber-threats. These socially engineered attacks seek to exploit people rather than technology. They are highly targeted, sent in low volumes and impersonate people in authority. Here are the findings for 2017.

Download this now


Stopping Email Fraud
By Sparx Solutions | 17/7/2018

Today’s email attacks have evolved. Unfortunately, most security tools haven’t evolved with them. Attackers are moving and adapting faster than most cyberdefences. They’re bypassing security tools with new techniques and delivery methods. And some are avoiding legacy controls altogether through novel attacks that don’t use malware at all.

This ebook developed by Proofpoint shows you how to protect your organisation from Impostors, phishers and other non-malware threats.

Download this now


Endpoint Security Buyers Guide
By Sophos | 13/7/2018

This guide will provide clarity by walking you through the key preventative technologies to ensure you have the right defences in place at the endpoint to protect your organisation. It will also enable you to see how different vendors stack up in independent tests, helping your make an informed choice.

Download this now


Benefits of Machine Learning
By CDM | 12/7/2018

As threats have grown more sophisticated, they’ve developed the ability to evade available detection tools and strategies. Machine learning can be useful in identifying advanced persistent threats, but this requires an understanding of the relationship between data features as well as knowledge of the malware landscape to be truly effective. The optimal approach uses an APT solution that is hardened by machine learning coupled with next-generation analysis, in order to sustain precise and responsive detection of current and future generations of threats.

Download this now


Ransomware Tactics and Detection Strategies
By CDM | 12/7/2018

Security administrators are expected to defend enterprise networks and their users from ransomware. Understanding the various types of ransomware and their propagation methods is the first step in this process. This white paper offers a deep dive into ransomware and explains how the Juniper Networks® Advanced Threat Prevention appliance can stop such attacks in their tracks.

Download this now


Combating Malvertising and Drive-By Downloads
By CDM | 12/7/2018

New strains of malware are constantly threatening businesses, creating angst for executives and security operation teams (SOCs). As cyber risks grow in volume and sophistication, the tools used to find and eradicate them have to get smarter and more scalable. This paper discusses the dynamic nature of advanced threats and the need for an advanced threat defense solution that offers a modern approach to cybersecurity, helping enterprises protect their intellectual property and the privacy of their employees.

Download this now


Employing machine learning in a security environment
By LogRhythm | 9/7/2018

No matter where you look in the security world today, you’ll see the terms machine learning and artificial intelligence (AI). There’s been a great deal of interest in machine learning and AI as security vendors and their customers look for better ways to improve their security posture and fight against advancing cyberattacks. Machine learning and AI offer breakthroughs in solving problems in many other areas of our lives, so it’s only natural to try to use them to make similar breakthroughs in the field of security

Download this now


Your Guide to Detecting and Responding to Threat Fast- Even if you dont have a 24x7 SOC
By LogRhythm | 9/7/2018

The paper first explains the basics of the Cyber Attack Lifecycle and the need to address it through the Threat Lifecycle Management framework. Next, the paper explains the basics of SOCs, providing details of what SOCs mean in terms of people, processes, and technology. Finally, the paper walks you through a methodology for building a SOC with limited resources, focusing on tactics to make your rollout smooth and successful.

Download this now


We Are Your Cyber Army
By Paraflare | 4/7/2018

“Today, no company is safe from the everchanging threat landscape.” In fact, businesses are frequently exposed to new software bugs and vulnerabilities. And while evidence suggests that organisational responses are not just predicated on prevention, the key is how quickly we react to an event or breach – and thus reduce the amount of dwell time of potential cyber criminals.

Download this now