Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • Ransomware is real. Protect your company before it's too late.

    White Papers // Jun 2017 // provided by Singtel

    The recent attacks by WannaCry and WannaCrypt ransomware strains have had major effects and impact on organisations and users worldwide – ransomware is particularly difficult to deal with as it may remain undetected by bypassing most levels of protection while wreaking havoc across any organisation. Learn how to Gain the ...

    Find Out More
  • A Practical Guide to Efficient Security Response

    White Papers // Jun 2017 // provided by ServiceNow

    Efficient response to security incidents is one of the biggest challenges for Information Security Leaders. That’s why choosing an integrated response platform is so important. Learn how with a great security operations solution in place, your team can make threat and vulnerability identification, remediation, and coordination efforts more efficient.

    Find Out More
  • Detect Your Web Application Vulnerabilities with Signtel Penetration Testing

    White Papers // Jun 2017 // provided by Singtel

    Learn how Singtel Web Application Penetration Testing helps businesses proactively detect web application vulnerabilities with penetration testing by global expertise to gain insights into current cyber defence readiness and prioritise weaknesses requiring immediate action.

    Learn More
  • Gear Up for Cyber Combat: Be Prepared for the Real Thing

    White Papers // Jun 2017 // provided by Singtel

    The cyber threat avalanche does not wait. Every business is a prime target and no one is spared. It is no longer about whether it will happen, but when it will happen or worse − if it has already happened without your knowledge. Learn how A Cyber Range offers a ...

    Read More
  • Status Quo Creates Security Risk: The State of Incident Response

    White Papers // Jun 2017 // provided by ServiceNow

    In late 2015 and early 2016, the Enterprise Strategy Group (ESG) conducted a research survey of 184 IT and cybersecurity professionals with knowledge of, responsibility for, or day-to-day operational oversight of incident response processes and technologies at their organizations. This whitepaper analyses the results of that survey.

    Learn More
  • Real IoT: Success Factors and Best Practices

    White Papers // Jun 2017 // provided by Cisco Jasper

    As it happens with any wave of new, potentially disruptive technology, hype can overshadow the real value that is being generated. The hype with the Internet of Things (IoT) is no different; with proclamations of trillion-dollar economic value adding from billions of connections. While there are always slivers of ...

    Learn More
  • IoT Security Checklist

    White Papers // Jun 2017 // provided by Cisco Jasper

    The Internet of Things (IoT) is a broad concept, encompassing many technologies dispersed horizontally across all sectors. At the core, IoT applications are employed in a variety of monitoring and control functions, providing valuable metrics for both consumers and businesses: tracking, measuring, collecting, analyzing, detecting, alerting, disseminating, locating, ...

    Read More
  • IoT Strategy: the 8 Key Questions to Ask

    White Papers // Jun 2017 // provided by Cisco Jasper

    IoT is changing how enterprises think about business transformation for two important reasons. First, when products are connected, customer relationships can become real-time and immediate – and even proactive. Second, the data collected from connected products and services enables not only building new and better products, but also allows ...

    Learn More
  • The Hidden Costs of Microsoft Office 365 Security and Compliance

    White Papers // Jun 2017 // provided by Proofpoint, Inc.

    If your organisation has decided to migrate to Microsoft Office 365 while you’ll likely benefit from its cloud collaboration capabilities, you might want to ask more about what Office 365 means for security, compliance and e-discovery. It sounds hard to turn down the promise of advanced threat protection, ...

    Find Out More
  • Human-Factor 2017 Infographic

    White Papers // Jun 2017 // provided by Proofpoint, Inc.

    Malicious emails exploit people, not code. Dramatic shifts in the threat landscape that started in 2015 continued throughout 2016 and into 2017. While exploit kits continue to drop as a percentage of malicious URL messages, over 90% of these links now lead to other sites, such as credential ...

    Continue