Infosecurity White Papers
Incident Response Challenges and Opportunities for European Enterprises
Organisations globally have come to realise that cybersecurity incidents are inevitable, and more costly than ever. Ninety percent of large businesses suffered a data breach last year, according to PwC research.
5 Steps to Improve Your Cyber Security Incident Response Plan
According to Ponemon institute, the average cost of data breach in the U.S. is over $5.4 million. There are a few factors that can positively impact this cost, and having an incident response is one of the most significant ones, with potential to decrease it by 15%.
The Rapid Detection and Response Model (RDRM)
Best Practices for Accelerating Your Response to Critical Security Incidents.
The Managed File Transfer Buyer’s Guide
This guide is designed to allow IT Managers to select the right file transfer solution to meet their organizational needs based on their individual requirements.
Modern SSL/TLS Best Practices for Fast, Secure Websites
What every IT professional should know about SSL security.
Buying into Mobile Security
An August IDG Research Services survey set out to glean insights into the mobile security investment risks. It was conducted among 100 IT leaders and IT security executives (49 percent of whom were CIOs).
Website Security Statistics Report 2015
This invaluable report provides information about the most prevalent vulnerabilities, how many get fixed, the average time to fix them, and provides recommendations for measurably improving application security programs.
8 Issues Derailing IT Team Innovation
What are the key challenges facing IT teams that can keep mission critical applications and infrastructure from running at full speed?
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Instead of assessing what the next 365 days will bring, we are going to look forward with a three year rolling window.
Preparing for the General Data Protection Regulation
Data protection laws across the EU are out of date and barely fit for purpose. Additionally, each member state has its own regime, creating a nightmare of compliance for businesses in the middle of the second decade of the 21st century.
Micro-Segmentation Builds Security Into Your Data Center’s DNA
Traditional network security systems have a major flaw: Once malware gets into the data center, it can move unhindered from workload to workload, wreaking havoc before it can be stopped. Micro-segmentation changes all that.
For the EU’s New Data Protection Regulation, Encryption Should be the Default
This document discusses the changes being made to the European data protection landscape and suggests that encryption should be the default choice for protecting data. However, this should just be part of the overall data security strategy, which must be comprehensive and consistent.
Key Management Compliance - Explained
Cryptographic key management is an umbrella term which refers to the various administration processes that govern the life cycle of keys andthe keys’ associated crypto material and metadata.
Securing Endpoints Against The Next Generation of Attacks
In today’s ‘always on, always connected’ world where sensitive data is almost certain to be stored electronically, organisations can no longer afford to operate without some form of Endpoint Protection. What does 2016 have in store for us?
Transforming Email Security: Insights with Forrester & Aetna
In the wake of high-profile email phishing attacks, heightened concerns around digital identity fraud have raised consumer expectations around the promise of your brand.
Anticipating Cyber Attacks: There’s No Abbottabad in Cyber Space
Download this white paper explaining how to track the data trail of threats, attackers, methods, and operations before they execute attacks.
Point-of-Sale System Breaches: Threats to the Retail and Hospitality Industries
From a security perspective, the most immediate risk to businesses and customers lies in accepting payments. The information customers hand over, if captured, can be used by cybercriminals to commit credit card fraud.
What CISOs Need to Know About The New NIST: Guidelines for Secure Shell
On August 20, 2014, The Computer Security Division of The National Institute of Standards and Technology (NIST) released Interagency Report 7966 (NISTIR 7966).
Best Practices for Migrating to Office 365
Many organizations are seriously considering the deployment of Microsoft Office 365 and Exchange Online. The result is that the penetration of Office 365 is expected to more than double by 2017, primarily at the expense of on-premises Exchange.
Evolving Threats Call For Integrated Endpoint Security Solutions With Holistic Visibility
High-profile breaches of personal data at retailers, government agencies, health care companies, and other entities make the news with frightening regularity.