Whitepapers


Sort by: Date | Company | Title


10 Things Your Next Firewall Must Do
By Palo Alto Networks | 16/7/2014

For enterprises looking at Next-Generation Firewall’s, the most important consideration is: Will this new technology empower your security teams to securely enable applications to the benefit of the organization? It's not about blocking applications, but safely enabling them.

Download this now


12 Proven Cyber Incident response Strategies
By FireEye | 26/2/2018

Cyber threats are constantly evolving, increasing in both sophistication and how they impact victims. In today’s world, you must battle a wide range of adversaries, from hacktivists to state sponsored threats. The most significant of these threats are advanced attackers who carefully plan and execute breaches into victim organizations. These targeted attackers quietly insert themselves into your environment, leveraging legitimate credentials to survey the environment and dig in deeper for extended operations. They can stay hidden for months—or years—all while advancing their mission, be it stealing your data or using your organization’s environment as a way to infiltrate another victim.

Download this now


2012 Data Breach Investigations Report
By HP | 5/4/2012

A study conducted by Verizon RISK Team with cooperation from the Australian Federal Police, Dutch National High Tech Crime Unit, Irish Reporting & Information Security Service, Police Central e-Crime Unit and United States Secret Service. This year our DBIR includes more incidents, derived from more contributors, and represents a broader and more diverse geographical scope. The number of compromised records across these incidents skyrocketed back up to 174 million after reaching an all-time low (or high, depending on your point of view) in last year’s report of four million. In fact, 2011 boasts the second-highest data loss total since we started keeping track in 2004. Read this report.

Download this now


2012 Mid-Year Trend and Risk Report
By IBM Australia | 25/7/2013

Over the past year, the IT security space has had numerous mainstream headlines. From the discovery of sophisticated toolkits with ominous names like Flame to cross-platform zero-day vulnerabilities, both consumers and corporations were inundated with advisories and alerts regarding emerging threats. The frequency of data breaches and incidents, continue their upward trajectory and have already hit new highs in 2011. Click to download!

Download this now


2013 Global Information Security Survey: Initial findings
By CSO | 7/11/2012

The results of PwC’s annual Global Information Security Survey indicate that companies are confident in their efforts to secure systems, information, and privacy. Strategies and personnel are in place, they say, and processes and technology are humming along. The number of incidents reported seems manageable. Read more.

Download this now


2014-2015 DCIG SIEM Appliance Buyers Guide
By LogRhythm | 1/12/2014

The Insider’s Guide to Evaluating Security Incident and Event Management Appliances

Download this now


2014 IBM Chief Information Security Officer Assessment
By IBM Australia | 26/3/2015

The 2014 edition of the CISO Assessment evaluates the current state of security leadership and what leaders expect to face in the next three to five years. Security leaders are in the midst of an evolution.

Download this now


2014 IBM Cyber Security Intelligence Index report
By IBM Australia | 26/3/2015

The annual Cyber Security Intelligence Index report offers a high-level overview of the major threats trending across businesses worldwide over the past year.

Download this now


2014 IBM X-Force Threat Intelligence Report 4Q 2014
By IBM Australia | 26/3/2015

This quarterly report from the IBM X-Force research and development team provides a closer look at today’s security risks – from new threats arising from within the Internet of Things, to the sources of malware and botnet infections.

Download this now


2014 Ponemon Cost of data breach study
By IBM Australia | 26/3/2015

IBM sponsored the and Ponemon Institute examined the actual costs of data breaches at 61 US companies and drew on the results of more than 500 interviews to reveal the true costs of data breaches today, from detection and escalation to customer churn.

Download this now