IT Security: Attacks

Click for details

The Hidden Costs of Microsoft Office 365 Security & Compliance

Click for more details

Download…

Click for details

The BEC Survival Guide

Click for more details

Download…

Click for details

Managing the Insider Threat with Active Directory Security

Click for more details

Download…

Tackling Attack Detection and Incident Response

The Enterprise Strategy Group (ESG) recently worked with Intel Security to analyze the results of a research project based upon a survey of 700 IT and security professionals at mid-market (i.e., 500 to 999 employees) and enterprise (i.e., more than 1,000 employees) organizations located in Asia, North America, EMEA and South America. Survey respondents came from numerous industries with the largest respondent populations coming from information technology (19%), manufacturing and materials (13%), and financial services (9%). Respondents were asked a series of questions about their organizations’ information security policies, processes, and technologies as well as their current security challenges and future strategies. Click for more details

Download…

Click for details

Making the Business Case for Office 365

The current iteration of Office 365 represents Microsoft’s 15-year-plus history of remotely hosted offerings that began in the late 1990s with hosted delivery of Microsoft Exchange through a variety of business partners. So, can a business case be made for deploying Microsoft Office 365? Absolutely yes, and man organizations agree, as shown in the following figure that shows the projected growth of Office 365 over the next two years.

Download…

Click for details

Threat Research: Targeted Attacks on Enterprise Mobile

Click for more details

Download…

Click for details

DDoS Defense for Financial Services Companies

Distributed denial of service (DDoS) attacks are increasingly becoming one of the most grievous security threats that any company with a significant online presence faces. In fact, four of the top five security threats today are DDoS related, with an average of 2,000–3,000 DDoS attacks per day on enterprises, financial institutions and governments.1 And the reality is that the severity, frequency and complexity of these attacks are on the rise, with no end in sight.

Download…

Click for details

DDoS Mitigation in a BYOD Architecture

The rapid consumer adoption of tablets, smartphones and other mobile devices creates a new challenge for corporate IT departments. This phenomenon is called “bring your own device” (BYOD).

Download…

Click for details

Protect Your Business

Purpose-Built DDoS Defense for eCommerce

Download…

Click for details

End-to-End DDoS Defense for Financial Services

Motivated by idealistic and monetary goals, well-organized hacker groups have set their sights on financial institutions and are attacking with a vengeance—armed with institutional intelligence and striking with unprecedented persistence. Because of this, every financial services company—whether a multi-million dollar bank or a local credit union—is now a potential target for distributed denial of service (DDoS) threats.

Download…

Click for details

Know and Secure the Enterprise

In today’s hyper-connected world, the financial performance and brand integrity of your company greatly depend on the operational performance and security of your network.

Download…

Click for details

DDoS Attacks in the Gaming Industry

Given its high-volume, high-transactional environment, the gaming industry must ensure 24/7 platform availability, 365 days a year. Any downtime has a significant financial and reputational impact. This makes gaming companies especially sensitive to DDoS attacks not only by hackers, but also by competitors and disgruntled clients.

Download…

Click for details

APT28: A Window into Russia’s Cyber Espionage Operations?

Our clients often ask us to assess the threat Russia poses in cyberspace. Russia has long been a whispered frontrunner among capable nations for performing sophisticated network operations.

Download…

Click for details

Demand More

Get the most from the move to a next-generation firewall. Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced evasion analytics, secured access control, and high availability.

Download…

Click for details

Protect Against Advanced Evasion Techniques

Understand the essential design principles to detect and stop advanced evasion techniques. Learn how to use multilayer traffic normalization and data stream-based inspection to prevent AET attacks.

Download…

Click for details

Advanced Evasion Techniques For Dummies

Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Here’s advice on how to evade AETs.

Download…

Click for details

Data Loss by the Numbers

Virtually every day there are stories about data loss in the news. This paper focuses on raw data obtained through the Open Security Foundation’s Data Loss Database or DataLossDB to help support improved decision making.

Download…

Click for details

Protecting Information

For more information and best practice considerations on how to boost security against malicious insiders and external attacker, download this whitepaper.

Download…

Click for details

Counter Stealthy Attacks

The most menacing type of cyberattack is invisible. The risk to enterprises is real as evidenced by recent high-profile attacks. Organisations need layered security controls that work together to detect the presence and actions of stealthy malware and attackers.

Download…

Click for details

Business-centric DLP

Re-think your DLP – This white paper discusses how a new DLP model aligns data discovery, classification, policy management, and security controls to your business requirements and processes.

Download…

Click for details

Endpoint Security: Anti-Virus Alone is Not Enough

The latest report by the Aberdeen Group asks the simple question: “Is anti-virus and a firewall enough security for businesses operating in today’s business environment?”

Download…

Click for details

Keep your PCs safe while surfing the Web

The Web has become a hub of information and productivity, making the web browser one of the most-used applications. This has drawn the attention of cyber criminals—making it a potential Achilles heel for security.

Download…

Click for details

Best Practices for Selecting a Web Application Scanning Solution

Automated Web Application Scanning (WAS) solutions help you discover web apps running in your network, determine whether they are vulnerable to attack, understand how to fix them, and protect your business.

Download…

Click for details

Best Practices for Selecting a Vulnerability Management (VM) Solution

Automated Vulnerability Management (VM) solutions help you discover devices running in your network, determine whether they are vulnerable to attack, find fixes to the underlying problems, and protect yourself while those fixes are being implemented.

Download…

Click for details

Achieve Situational Awareness

If you administer or manage endpoints, you probably have discovered an infected or compromised system. Your !rst reaction is to !nd the system and clean it, so that it does not affect your other systems, and the user can get back to work. Your second reaction is probably “how did this system get infected or compromised?” Unfortunately, most organizations do not have the ability to easily piece together all the information needed to understand an infection incident such as this. If just a single system is affected, it is a luxury for an administrator to track down the root cause—a luxury few can or choose to afford.

Download…

Select a topic