Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • White Paper: Unit 42 Cloud Threat Report, Spring 2020

    White Papers · Jun 2020 · Provided By Palo Alto Networks

    For the Spring 2020 edition of the Unit 42 Cloud Threat Report, the team of elite cloud threat researchers uncover where cloud vulnerabilities are surfacing in infrastructure as code (IaC) templates, as well as providing a deep dive into cryptomining operations and broader cybercrime trends.

    Read More
  • Mimecast | Cyber Threat Intelligence Webinar

    Webcasts · Jun 2020 · Provided By Mimecast

    Join our monthly Cyber Threat Intelligence Webcast Series to learn how to better secure your mobile workforce in the evolving threat landscape across Australia and New Zealand. Our experts will also be standing by to answer your questions and discuss what you’re seeing. Register once to be signed up for...

    Register Now
  • Comparison chart: VPN service providers

    Tools & Templates · Jun 2020 · Provided By TechRepublic Premium

    Selecting the right VPN provider for your needs requires a fair bit of legwork because the choices are many and the offerings vary greatly. This quick-glance chart rounds up 15 of the top contenders and compares them across criteria such as OpenVPN support, pricing, connections, and logging. More on...

    View This Now
  • New Employee Checklist and Default Access Policy

    Tools & Templates · Jun 2020 · Provided By TechRepublic Premium

    Onboarding new employees and providing them with the equipment and access they need can be a complex process involving various departments. However, a standard set of guidelines which can be reused and revised as needed can streamline these endeavors. A new employee checklist and default access policy assigns responsibilities for...

    View This Now
  • The Definitive Email Security Strategy Guide

    White Papers · Jun 2020 · Provided By Proofpoint

    Email is organizations’ most essential business tool and cyber attackers trick users into clicking on an unsafe link, giving away their credentials, or even unwittingly carrying out attacks themselves (such as wiring money or sending sensitive files). The threats have changed. Yet much of the cybersecurity sector remains stuck in...

    Find Out More
  • You’ve Got Business Email Compromise!

    White Papers · Jun 2020 · Provided By Proofpoint

    Requests from the appropriate person, requests for wire transfers or sensitive employee information may be part of a normal workday. BEC scammers take advantage of human psychology and business processes to trick your users. It’s no wonder BEC scams have stolen billions of dollars from victims already—and the pace is...

    Find Out More
  • 2020 Cost of Insider Threats Global Report

    White Papers · Jun 2020 · Provided By Proofpoint

    Ponemon Institute is pleased to present the findings of the 2020 Cost of Insider Threats Global Report study. We interviewed 964 IT and IT security practitioners in 204 organizations in North America (the United States and Canada), Europe, Middle East & Africa, and Asia‑Pacific. Our targeted organizations were business...

    Find Out More
  • State of the Pish

    White Papers · Jun 2020 · Provided By Proofpoint

    Our sixth annual State of the Phish report again brings you critical, actionable insights into the current state of the phishing threat. You will learn about: • The end-user awareness and knowledge gaps that could be hurting your cyber security defenses. • The impacts information security professionals are experiencing because...

    Find Out More
  • User Risk Report

    White Papers · Jun 2020 · Provided By Proofpoint

    Proofpoint customers reported nearly 9.2 million suspicious emails in 2019, an increase of 67% over 2018. In Q3 2019 alone, users alerted their security teams to thousands of serious threats, including: • Nearly 20,000 credential-based phishing attacks • More than 4,000 attacks with malware payloads, including high-severity remote access Trojans...

    Find Out More
  • Protect Microsoft Office 365 Content with MaaS360

    White Papers · Jun 2020 · Provided By ViewQwest

    Microsoft Office 365 offers a user-friendly, fast and collaboration-friendly suite of applications which can be used on any device from anywhere. However, there may be better solutions for securing Office 365 content than going “all-in” with Microsoft’s mobility, endpoint and identity management tools. MaaS360 offers proven and robust built-in capabilities...

    Read More