CyberEdge’s 2019 Cyberthreat Defence Report16/05/2019 Risk and Security, Secure Information Exchange, Security
New research from CyberEdge’s 2019 Cyberthreat Defence Report shows that, despite increasing cybersecurity budgets, organisations are not only having to deal with an exponential increase in cyberattacks, but also the manifold challenges of finding and properly utilising human and financial resources, ultimately stymieing organisations’ efforts to hunt down threats.
The Economics Of Fraud - Mitigating Risk Amidst Fast Growth and Innovation13/05/2016 Security
Do you know what the fraud hotspots in Asia Pacific are? How are businesses protecting their firms from fraudulent activity and transactions? Learn how you can leverage these results and more to help see where your company stands when it comes to fraud prevention measures.
IBM X-Force Threat Intelligence Quarterly - 2Q 201513/07/2015 Security
The rise of social media, cloud, mobility and big data makes insider threats harder to identify and provide more ways to pass protected information. Read the IBM X-Force Threat Intelligence Quarterly report to learn more how to combat insider threats.
Fortifying for the future - Insights from the 2014 IBM Chief Information Security Officer Assessment07/07/2015 Security
The role of IT security leaders is entering new territories. The downside of being more connected with customers, suppliers and partners is an increased vulnerability to attacks.
Surfacing Critical Cyber Threats Through Security Intelligence25/05/2015 Security
Security Intelligence is the single most effective investment toward achieving the goal of becoming impervious to cyber threats.
The Cyber Threat Risk – Oversight Guidance for CEOs and Boards17/05/2015 Security
The fate of an organisation whose defences have been compromised will be influenced by the speed with which they can detect and respond to intruders. Read the report to learn:
• The emerging cyber threat vectors in 2015
Six Considerations for Securing a BYOD Workforce10/04/2015 IT Systems Management, Mobility, Security
How many devices does your business use? Whether a company provides iPads and laptops or employees bring in their own, more devices means more headaches for IT. Risky cloud sharing, unsecured wi-fi and lack of data encryption can be very costly.
5 Steps to Improve Email Compliance17/03/2015 Security
While regulations governing email security can be complex, email security doesn’t have to be. This whitepaper outlines 5 straight-forward steps that organisations can follow to develop an effective policy to help address technical security safeguard standards for email.
Old techniques, new channel: mobile malware adapting PC threat techniques13/03/2015 Security
Learn how to mitigate fraud risks even as cybercriminals innovate and extend PC threat techniques to the mobile device. Discover how cybercriminals steal credentials from a victim’s PC via malware or phishing to commit account takeover through the mobile channel and more.
Adding Extra Security to Cloud Storage09/03/2015 Cloud, IT Systems Management, Security
Last year over a billion digital records were compromised worldwide. Today’s organisations possess information stockpiles that have immense appeal for criminal hackers. Regrettably, with the increasing sophistication and capability of the modern hacking threat, leading industry figures now appreciate it’s not a matter of 'if' a breach will occur, but 'when'.
This complimentary white paper explores the inevitability of data breach for today’s businesses, and an elegant solution to protect your sensitive data across your entire business network, both on-premise and in the cloud.
The Pitfalls of Two-Factor Authentication08/03/2015 Security
Prevent cybercriminals from identify theft and financial fraud today. Explore the shortcomings of two-factor authentication and how you can help identify the root cause of malware, phishing attacks and combat against new Trojans such as Dyre, Zeus, Citadel, Shylock and more!
This white paper explores the shortcomings of two-factor authentication, including its inability to defend against identity theft and transaction signing, as well as its negative impact on end-user experience.
Firewall Cleanup Recommendations: Considerations for Improved Firewall Efficiency, Better Security, and Reduced Policy Complexity02/03/2015 Security
The majority of all data breach incidents do not result from circumvention of advanced defensive systems and complex security controls; but from the failure of well-established systems, in particular firewalls, that have become too numerous and complex to manage effectively.
Financial Malware Explained02/03/2015 Security
Explore the lifecycle of fraudulent transactions and how to take action against emerging threats, including the tactics that cybercriminals use to infect victims’ machines, harvest credentials and execute fraudulent transactions.
Modern Threats Need Modern Threat Prevention02/12/2014 Security
The desire to prevent threats from viruses, bots and software vulnerabilities creates a need for a solution that can mitigate multiple threats all at once. A unified approach is needed to provide effective coverage and ease the work of the IT security team.
Detecting Insider Threats: How Splunk Software is Used to Safeguard Financial Data26/11/2014 Security
Financial institutions increasingly rely on outside contractors to program and maintain applications, manage projects, and perform analyses and assessments. Unfortunately, whether intentionally or not, these contract employees can pose a serious insider threat.