Infosecurity White Papers
Blind Trust Is Not A Security Strategy - Lessons From Cloud Adopters
An Enterprise Management Associates® (EMA™) white paper prepared for iland
2016 State of Data Security and Compliance Report
Ipswitch and Vanson-Bourne polled 555 IT team members who work in companies across the globe with greater than 500 employees, between October-November 2015 to learn about their file transfer habits and goals.
How to Comply with the New European Data Protection Laws
The GDPR will come into force in May 2018. Organisations have until then to review their processes and security strategies in order to comply with it.
Building Resilient Cloud Network Architectures
This paper builds on our recent Pragmatic Security for Cloud and Hybrid Networks research, focusing on cloud-native network architectures that provide security and availability infeasible in a traditional data center.
The Rise of the Cloud Security Professional
This white paper looks at the relationship between IT and the C-suite, and the role of CCSPs as key players on the strategic forefront of a company’s life.
Detection & Analysis of Dridex with CyberShield AnD for IT
Dridex has been one of most notable threats since its appearance in late 2014 and throughout 2015. A strain of malware evolving from the infamous Zeus family, it is designed to steal personal banking information and credentials.
Not all Certificate Authorities are Created Equal
There have been a string of successful attacks on certificate authorities (CAs) this year, and the threat to CAs will certainly not abate.
Webinar Report:The Five Stages of Insider Threat
Much has been made of the insider threat faced by organisations this year and many vendors are hooked on the message of fixing the problem with technologies but the issue requires a lot more thought than that.
Resilient Systems and the Rise of the Incident Response Platforms
Maintaining a discipline of strong cybersecurity has become increasingly difficult at enterprise organizations for several reasons.
Questions that I am Most Frequently Asked by New Buyers of SSL Certificates
If you are new to the SSL certificate market, I am sure that you will have at least one of these questions as well.
How Trust Really Affects Online Shoppers’ Decision to Buy
Trust is essential, but just how well are website owners doing at building trust with their potential online customers?
5 Ways of Empowering your Incident Response Team
How should incident response teams work to mitigate and respond to your network’s cyber threats and incidents?
Six Golden Rules for Selecting an SSL or TLS Certificate
The foundation of trusted Internet communications are Secure Socket Link (SSL) certificates, an encryption technology installed on Web servers that permits transmission of sensitive data through an encrypted connection.
Website Security Threat Report 2015
The Symantec Website Security Threat Report gives enterprises, small businesses, and consumers essential information to secure their systems effectively now and into the future.
Website Security for Dummies
Download this guide for helpful information on the importance of website security, tips to establish a web security program, and designing, creating and building a safe, secure website.
Simple Steps to a Secure Website in 2016
384 million identities were exposed in 2014 as a result of data breaches. That’s equivalent to the whole population of Western Europe.
The First 72-Hours: How to Approach the Initial Hours of a Security Incident
I've Got an Alert. Now What?
Hidden Dangers Lurking in E-Commerce- Reducing Fraud with the Right SSL Certificate
Research from Norton estimates the global price tag of consumer cybercrime now topping some US$113 billion annually which is enough to host the 2012 London Olympics nearly 10 times over.
The Cyber Resilient Organisation in the United Kingdom: Learning to Thrive against Threats
Are businesses ready today to face cyber threats head on? To find out, Ponemon Institute surveyed 450 IT and IT security practitioners in the United Kingdom about their organisations’ approach to becoming resilient to security threats. The findings are presented in this study.
CloudFlare Advanced DDoS protection
Although DoS attacks are not a recent phenomenon, the methods and resources available to conduct and mask such attacks have dramatically evolved to include distributed (DDoS) and, more recently, distributed reflector (DRDoS) attacks—attacks that simply cannot be addressed by traditional on-premise solutions.