CSO Whitepapers


Sort by: Date | Company | Title


The Mimecast email security risk assessment
By Mimecast | 18/8/2017

Many organizations think their current email security systems are up to the task of protecting them. Unfortunately many email security systems fall short and do not keep their organisations safe. The reality is the entire industry needs to work toward a higher standard of quality, protection and overall email security. The proof is in the numbers, and Mimecast is establishing a standard of transparency for organisations and raising the bar for all security vendors.

Download this now


Strengthen your defenses against cybercrime
By Mimecast | 18/8/2017

Operating and securing a business in the cloud can be hard. The rapid evolution of cyberthreats, inevitability of technical failure, and potential for human error are risk factors that organisations simply can’t ignore. These risk factors can cause irreparable damage like business disruption, lengthy downtime and data loss. Plus, the complexity and cost involved with addressing these

Download this now


Advancing your anti-phishing program: How to be successful against email-borne attacks
By Mimecast | 18/8/2017

There appears to be no end in sight to the reign of phishing as the cyber attacker's number one threat delivery and communication vehicle. No surprise that the Verizon DBR 2017 report dubbed email as the "cyber spy's favored way in". Whether it's a script kiddie just goofing around, a member of one of the world's most sophisticated nation-state-based attacker groups trying to impact global politics, or a cybercriminal focused on turning digital information into digital cash, they all use email in their attack repertoire.

Download this now


How to make your business more secure using Dell & Windows 10
By Dell | 4/8/2017

Effectively securing your enterprise is a continuous effort that requires constant attention and improvements. Rapid technological change can resolve business problems and pave the way towards digital transformation, but it also creates new points of potential vulnerability – which can create new security problems that interrupt or disable the business.

Download this now


Ransomware: A growing Enterprise threat
By CrowdStrike | 13/7/2017

A deep dive into ransomware's evolution and why businesses can't afford to ignore it

Download this now


Who Needs Malware?
By CrowdStrike | 13/7/2017

HOW ADVERSARIES USE FILELESS ATTACKS TO EVADE YOUR SECURITY

Download this now


Telstra Cyber Security Report 2017
By Telstra Corporation | 13/7/2017

Managing risk in a digital world.

Download this now


CrowdStrike Falcon Overwatch
By CrowdStrike | 13/7/2017

STOP INCIDENTS BEFORE THEY TURN INTO BREACHES

Download this now


CrowdStrike Falcon Prevent Next-Generation Antivirus
By CrowdStrike | 13/7/2017

GET BETTER PROTECTION AND BETTER PERFORMANCE IMMEDIATELY BY REPLACING YOUR CURRENT AV SOLUTION WITH CROWDSTRIKE FALCON PREVENT

Download this now


CrowdStrike Falcon Insight Endpoint detection and response
By CrowdStrike | 13/7/2017

STREAMING THE THREAT DETECTION AND RESPONSE LIFECYCLE WITH SPEED, AUTOMATION AND UNRIVALED VISIBILITY

Download this now

Market Place