Cyber attacks Whitepapers


Sort by: Date | Company | Title


The Ransomware Threat
By LogRhythm | 14/9/2017

A guide to detecting an attack before it’s too late NOTPETYA SPECIAL EDITION

Download this now


Automating Cloud Security to Mitigate Risk | SANS Whitepaper
By Skybox Security | 27/7/2017

As cloud computing services evolve, the cloud opens up entirely new ways for potential attacks. In February 2017, Tavis Ormandy of the Google Project Zero team exposed major memory leakage in Cloudflare’s Content Delivery Network (CDN) web caching services. It exposed all sorts of sensitive data, including passwords, authentication tokens and cookies. Although this is just one example of a cloud-oriented service with a major security issue (which, for the record, the company responded to immediately and remediated quickly), it demonstrates that all of us may have more exposure points than we realise.

Download this now


Advanced endpoint protection for dummies
By Palo Alto Networks | 26/10/2015

Cyberattacks have evolved to become much more complex, however the core techniques employed by malware are usually recycled and largely unchanged.

Find out how these targeted attacks affect companies in real world cases and why legacy solutions that focus on detection are insufficient to protect secure enterprise data. Included are also 10 preventative measures you can take to prevent a corporate security breach.

Download this now


The definitive guide for evaluating cybersecurity solutions
By Palo Alto Networks | 26/10/2015

Cyber criminals today are deploying sophisticated attacks on enterprises making the role of security professionals much more complex than ever before. Find out the 10 requirements your cybersecurity solution must meet to ensure secure application enablement at every location and how you should widen your RFP selection criteria when choosing a security provider.

Download this now


The Importance of Cyber Threat Intelligence to a Strong Security Posture
By Webroot | 16/4/2015

This research report explores the importance of security strategy and Cyber Threat Intelligence. The purpose of the study is to understand how companies are using, gathering and analyzing threat intelligence as part of their IT security strategy.

Some of the topics covered are:

Whether timely, accurate and actionable cyber threat intelligence make a difference in blocking or preventing external attacks.

Are companies using cyber threat intelligence effectively to make informed decisions about how to respond to a menace or hazard

Download this now


Cloud-Based Security Threats Present Challenges and Opportunities for MSPs
By Webroot | 7/1/2014

Cloud computing has fundamentally changed the way businesses and consumers use computers and technology and the way Information Technology (IT) professionals manage those resources. While the cloud has delivered a multitude of benefits to technical and non-technical people alike, there have also been significant downsides to reliance on cloud technology, including unplanned outages and even outright cyberattacks and data theft.

Download this now


The 10-Step Security Action Plan
By Trend Micro Australia | 1/8/2013

In this whitepaper, we look at ten essential steps in creating an effective action plan to defend against targeted attacks and APTs. These steps will help you to consider your current situational awareness, level of preparation and operative ability to ward off a persistent attacker. For more, click to download

Download this now


A Forrester Consulting Thought Leadership Paper - The State Of Endpoint Protection
By Webroot | 5/10/2012

Webroot commissioned Forrester Consulting to conduct a survey study of 161 North American and European IT security decision-makers. The purpose of the study is to understand the current state of endpoint security strategies across enterprises and SMBs, as well as identify key trends and market directions for endpoint security. This study took a detailed look at how organisations deploy endpoint security products, their common practices, pain points, and challenges.

Download this now


SecureAnywhere Business — Endpoint Protection
By Webroot | 5/10/2012

Face it, your current endpoint security software is slow, heavy and you wonder if it causes more problems than it solves. Meanwhile you have to keep up with a number of new challenges — from a more mobile workforce to more malicious malware. Read more.

Download this now


Webroot® SecureAnywhere™ Business - Endpoint Protection Overview
By Webroot | 4/10/2012

With the exponential growth and sophistication of malware today, the security industry can no longer afford to ‘bury its head in the sand’. The bottom line is that traditional endpoint security protection is now ineffective due to the sheer volume, quality, and complexity of malware. This paper looks at this problem and how Webroot, by going back to the drawing board on countering malware threats, is revolutionisng endpoint protection and solving the issues that hinder existing endpoint security solutions.

Download this now

Market Place