1
5
3
5
29
5
16
1
7
15
4
3
4
6
2
2
1
6
2
4
1
40
3
20
2
6
24
6
1
18
5
4
1
3
3
3
2
3
2
1
1

CyberEdge’s 2019 Cyberthreat Defence Report

16/05/2019
Risk and Security, Secure Information Exchange, Security

New research from CyberEdge’s 2019 Cyberthreat Defence Report shows that, despite increasing cybersecurity budgets, organisations are not only having to deal with an exponential increase in cyberattacks, but also the manifold challenges of finding and properly utilising human and financial resources, ultimately stymieing organisations’ efforts to hunt down threats.

Experian The Economics of Fraud

The Economics Of Fraud - Mitigating Risk Amidst Fast Growth and Innovation

13/05/2016
Security

Do you know what the fraud hotspots in Asia Pacific are? How are businesses protecting their firms from fraudulent activity and transactions? Learn how you can leverage these results and more to help see where your company stands when it comes to fraud prevention measures.

IBM X-Force Threat Intelligence Quarterly - 2Q 2015

13/07/2015
Security

The rise of social media, cloud, mobility and big data makes insider threats harder to identify and provide more ways to pass protected information. Read the IBM X-Force Threat Intelligence Quarterly report to learn more how to combat insider threats.

Fortifying for the future - Insights from the 2014 IBM Chief Information Security Officer Assessment

07/07/2015
Security

The role of IT security leaders is entering new territories. The downside of being more connected with customers, suppliers and partners is an increased vulnerability to attacks.

Surfacing Critical Cyber Threats Through Security Intelligence

25/05/2015
Security

Security Intelligence is the single most effective investment toward achieving the goal of becoming impervious to cyber threats.

The Cyber Threat Risk – Oversight Guidance for CEOs and Boards

17/05/2015
Security

The fate of an organisation whose defences have been compromised will be influenced by the speed with which they can detect and respond to intruders. Read the report to learn:
• The emerging cyber threat vectors in 2015

Six Considerations for Securing a BYOD Workforce

10/04/2015
IT Systems Management, Mobility, Security

How many devices does your business use? Whether a company provides iPads and laptops or employees bring in their own, more devices means more headaches for IT. Risky cloud sharing, unsecured wi-fi and lack of data encryption can be very costly.

5 Steps to Improve Email Compliance

17/03/2015
Security

While regulations governing email security can be complex, email security doesn’t have to be. This whitepaper outlines 5 straight-forward steps that organisations can follow to develop an effective policy to help address technical security safeguard standards for email.

Old techniques, new channel: mobile malware adapting PC threat techniques

13/03/2015
Security

Learn how to mitigate fraud risks even as cybercriminals innovate and extend PC threat techniques to the mobile device. Discover how cybercriminals steal credentials from a victim’s PC via malware or phishing to commit account takeover through the mobile channel and more.

Adding Extra Security to Cloud Storage

09/03/2015
Cloud, IT Systems Management, Security

Last year over a billion digital records were compromised worldwide. Today’s organisations possess information stockpiles that have immense appeal for criminal hackers. Regrettably, with the increasing sophistication and capability of the modern hacking threat, leading industry figures now appreciate it’s not a matter of 'if' a breach will occur, but 'when'.

This complimentary white paper explores the inevitability of data breach for today’s businesses, and an elegant solution to protect your sensitive data across your entire business network, both on-premise and in the cloud.

 

The Pitfalls of Two-Factor Authentication

08/03/2015
Security

Prevent cybercriminals from identify theft and financial fraud today. Explore the shortcomings of two-factor authentication and how you can help identify the root cause of malware, phishing attacks and combat against new Trojans such as Dyre, Zeus, Citadel, Shylock and more!

This white paper explores the shortcomings of two-factor authentication, including its inability to defend against identity theft and transaction signing, as well as its negative impact on end-user experience. 

Firewall Cleanup Recommendations: Considerations for Improved Firewall Efficiency, Better Security, and Reduced Policy Complexity

02/03/2015
Security

The majority of all data breach incidents do not result from circumvention of advanced defensive systems and complex security controls; but from the failure of well-established systems, in particular firewalls, that have become too numerous and complex to manage effectively.

Financial Malware Explained

02/03/2015
Security

Explore the lifecycle of fraudulent transactions and how to take action against emerging threats, including the tactics that cybercriminals use to infect victims’ machines, harvest credentials and execute fraudulent transactions.

Modern Threats Need Modern Threat Prevention

02/12/2014
Security

The desire to prevent threats from viruses, bots and software vulnerabilities creates a need for a solution that can mitigate multiple threats all at once. A unified approach is needed to provide effective coverage and ease the work of the IT security team.

Detecting Insider Threats: How Splunk Software is Used to Safeguard Financial Data

26/11/2014
Security

Financial institutions increasingly rely on outside contractors to program and maintain applications, manage projects, and perform analyses and assessments. Unfortunately, whether intentionally or not, these contract employees can pose a serious insider threat.