Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • South Africa Phishing Response Trends

    White Papers // Sep 2018 // provided by Cofense

    Organisations in South Africa and around the world are moving aggressively to fight phishing attacks. With the number of global phishing attacks at 1,220,523, a 65% increase over the previous year, it’s no wonder we find ourselves in an arms race against attackers. So, are we winning the...

    Learn More
  • Evolving Risk Landscape

    White Papers // Sep 2018 // provided by F5

    In today's digital marketplace, your applications are your business. So, while apps have increased productivity and the speed of innovation, they have also opened the door to unprecedented threats, expanding the risk landscape and putting corporate data and reputations at risk. In this eBook you will learn how the days...

    Find Out More
  • Phishing Confessions from Security Pros eBook

    White Papers // Sep 2018 // provided by Cofense

    Download this eBook to find out what security professionals think about phishing, and how they combat the threat. Do other security professionals share the same phishing worries and have similar defences in place? How does your team compare to peers? Highlights include: The 4 scariest...

    Find Out More
  • Phishing Response Trends - Europe

    White Papers // Sep 2018 // provided by Cofense

    Phishing is the #1 threat, but most companies are unprepared. That’s what we heard from IT professionals across major industries in Europe To learn why so many companies can’t handle a phishing attack, download our new report on phishing response trends. How about your...

    Learn More
  • IT Resilience Maturity Benchmark Tool from IDC

    Tools & Templates // Sep 2018 // provided by Zerto

    More than 90% of organizations are falling short of what is advised for IT Resilience – and in turn, they are setting up their digital transformation imperatives and their business to fail. How prepared is your organization to drive digital transformation, while ensuring there are no disruptions – whether natural...

    View this now
  • The State of IT Resilience: IDC Report

    White Papers // Sep 2018 // provided by Zerto

    This white paper introduces readers to IT resilience and its importance in the context of operational continuity and data management and its relation to cloud adoption and digital transformation. The white paper uses findings from the survey to illustrate some of the key tenets of IT resilience and the challenges...

    Download Now
  • 2018 State of IT Resilience: IDC Webinar

    Webcasts // Sep 2018 // provided by Zerto

    More than 90% of organizations are falling short of what is advised for IT resilience, setting up their digital transformation imperatives - and their business - to fail. Without a solid IT resilience foundation, organizations are at risk of disruption and data loss, jeopardizing customer loyalty, company valuation, reputation,...

    Watch Now
  • Moving Beyond Disaster Recovery to Achieve IT Resilience: eBook

    Ebooks // Sep 2018 // provided by Zerto

    INSIDE THE GUIDE: 1. How to prepare for both unplanned and planned disruptions to ensure continuous availability 2. Actionable steps to help remove the complexity of moving and migrating workloads across disparate infrastructures 3. Guidance on hybrid and multi-cloud IT: gain the flexibility to move applications in and out...

    View this now
  • Reducing Cyber Exposure from Cloud to Containers: 5 Key Learnings from the CISO POV

    White Papers // Sep 2018 // provided by Tenable

    When it comes to IT infrastructure, it’s fair to say the perimeter has left the premises. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, today’s attack surface presents a growing challenge to CISOs looking to understand and reduce their cyber risk. To combat...

    Download Now
  • Cyber Defender Strategies: What Your Vulnerability Assessment Practices Reveal

    White Papers // Sep 2018 // provided by Tenable

    What’s your vulnerability assessment style? Are you scanning weekly, monthly or quarterly? And, what does your scanning habit reveal about the maturity of your organization’s vulnerability assessment practices, a critical part of cyber hygiene? These are the key questions Tenable Research set out to answer in our Cyber Defender Strategies...

    Download Now