Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • How to Implement Practical Security Assessments

    White Papers // Jul 2017 // provided by Rsam

    Organizations are scrambling to identify security weaknesses before their adversaries do. Having a consistent, systematic, and scalable methodology to properly assess your environment is essential. To begin you need a solid understanding of the organization, its components, what it relies on, and what could cause it harm. The Relational Security ...

    Download Now
  • Implementing Effective Incident Response

    Videos // Jul 2017 // provided by Rsam

    Every day cyber-attacks grow in both complexity and volume. Most organizations have focused largely on prevention strategies and lack the same maturity when it comes to incident response. Minimizing the time it takes to respond to an attack can make the difference between suffering a breach or not. This webinar ...

    Watch Now
  • Asia Pacifc MPOWER - Cybersecurity Summit Signup

    Live Event // Jul 2017 // provided by McAfee

    You are invited to the inaugural Asia Pacific MPOWER Cybersecurity Summit in Sydney on 14 November 2017. With over 750 delegates and 30 sessions including deep dives and strategy discussions, this free event is not to be missed. Gain insights from our customers, technology partners and leading industry experts, ...

    Register Now
  • Last Chance to register for RSA APJ Summit on 25 July, 2017 - Enabling Business Driven Security

    Live Event // Jul 2017 // provided by RSA

    No need to sign up for multiple infosec events to stay on top of industry happenings. Just come to RSA Summit and you’ll leave with all information on solutions and strategies you need to keep your organization safe. The Summit will deliver a range of content across 4 tracks: ...

    Find Out More
  • So what is GDPR?

    White Papers // Jul 2017 // provided by EveryCloud

    GDPR is the EU's response to the privacy debate. Its stated objective is to give control of personal data back to the person. The data you collect on customers and prospects is no longer yours. It's theirs. And it's your responsibility to make sure it's properly protected. The EU’s General ...

    Read More
  • Break the DDoS Attack Chain Without Breaking the Bank

    White Papers // Jul 2017 // provided by Singtel

    The unpredictability and overwhelming volume of distributed denial of service (DDoS) incursions can bring business operations to a standstill. They have to be stopped at all costs; but can you afford it? DDoS Shelter plan is a minimal form of insurance/standby protection designed for SMEs with limited budgets.

    Learn More
  • Horizon with NSX for Federal Agencies

    White Papers // Jul 2017 // provided by Carahsoft & VMware

    Managing applications, servers, users, and expenditures has become more challenging for federal agencies. At the same time, security threats and actual attacks have increased in frequency and ferocity. The challenge for IT managers is to provide access to applications and desktop computing in a world where a single mistake, by ...

    Download Now
  • Managing Cloud Sprawl in the Age of Cloud Services

    White Papers // Jul 2017 // provided by Citrix

    Cloud computing has become so omnipresent that organisations are adopting it at almost every layer of their business. While these cloud investments deliver immeasurable benefits, they have also had unintended side effects- creating complexity and introducing risk. This cloud sprawl is a major IT pain point. With ...

    Read More
  • Achieve GDPR Readiness with Secure App and Data Delivery

    White Papers // Jul 2017 // provided by Citrix

    Citrix simplifies security and compliance by enabling IT to create a software-defined perimeter that combines secure access to apps and data with contextual control, visibility and behaviour analytics across devices, networks and clouds. By extending control beyond the traditional data centre to mediate user interactions with apps and ...

    Read More
  • Infographic: Does my Enterprise need Web Application Security?

    White Papers // Jul 2017 // provided by Akamai

    Learn Why Cloud-Based Security is Crucial for Enterprise Web Applications and how a cloud security solution for your Web Application Firewall provides the strongest protection and freedom from DDoS attacks.

    Read More