Cyber threats Whitepapers


Sort by: Date | Company | Title


2012 Mid-Year Trend and Risk Report
By IBM Australia | 25/7/2013

Over the past year, the IT security space has had numerous mainstream headlines. From the discovery of sophisticated toolkits with ominous names like Flame to cross-platform zero-day vulnerabilities, both consumers and corporations were inundated with advisories and alerts regarding emerging threats. The frequency of data breaches and incidents, continue their upward trajectory and have already hit new highs in 2011. Click to download!

Download this now


IT Executive Guide to Security Intelligence
By IBM Australia | 25/7/2013

Security intelligence, built upon the same concepts that have made business intelligence an essential enterprise technology, is the critical next step for organizations that recognize the importance of information security to their business health. In this white paper, we discuss how security intelligence address these shortcomings and empower organisations, from Fortune Five companies and mid-size enterprises to government agencies, to maintain comprehensive and cost-effective information security. Read now.

Download this now


Prioritising Security Intelligence through Security-As-A-Service
By IBM Australia | 26/7/2013

‘Security intelligence’ is a term that is commonly used within the information security community, but one that often lacks clarity and definition. In this market review by Forrester, we look at the growth of security-as-a-service (SAAS) solutions and the challenges in implementing this change. Click to download.

Download this now


A Guide to Staying Secure Amidst Gorwing Threats and the Expanding Digital Universe
By RSA | 11/5/2011

Security management needs to evolve to protect business, government, and individuals from growing cyber threats. This Paper outlines challenges facing security executives and teams and uses an “air traffic control system” analogy to show how advanced security management systems can deliver better security by providing a single point of visibility and coordination for physical, virtual, and cloud assets. Solutions are presented where business processes, policy, controls, and data work in concert to achieve the vision of an air traffic control system for information security.

Download this now


Discover The Benefits of Choosing a Hosted Security Solution
By Symantec | 12/4/2011

This paper examines three solution types that are commonly implemented to address these challenges: onpremise software, on-premise appliances, and hosted security offerings, and provides an overview of their effectiveness in common usage scenarios, as well as a discussion of their impact on overall IT budget. The paper concludes with a discussion of increasing adoption of hosted security services and a summary of the key reasons why many businesses of all sizes are selecting this as a model for protecting their businesses from cyber threats.

Download this now


The Tangled Web: Silent Threats & Invisible Enemies
By Symantec | 12/4/2011

This Symantec.cloud white paper focuses on the emergence of covert information theft as a key tactic of malware propagators. Most importantly, the paper highlights the crucial danger points for any business that doesn’t defend itself against viruses which operate in the background.

Download this now


Networking or Not Working | Facing Up to the Facebook Dilemma
By Symantec | 12/4/2011

This White Paper weighs up Facebook’s pros and cons, and shows how to keep your company safe – whatever policy you choose to implement.

Download this now


Best Practices for Mitigating Advanced Persistent Threats
By Trend Micro Australia | 22/10/2012

Today, many security practitioners do not acknowledge that there are advanced threats that have bypassed their security protection techniques and reside undetected on their systems. In this whitepaper, we look at how research will enable security practitioners to understand these new threats and steps they must take in order to reduce the risk of being compromised. Click to download.

Download this now


ESG - Understanding and Addressing APTs
By Trend Micro Australia | 22/10/2012

Three years ago, few people outside of the U.S. Department of Defense (DoD) or other military/intelligence organisations had heard of Advanced Persistent Threats (APTs). Now these kinds of targeted cyber attacks have become routine with discussion extending across the technology, business, and mainstream media. In this whitepaper, we look at exactly are APTs and what enterprise organisations are doing to defend themsleves. Read more!

Download this now


Detecting the Enemy Inside the Network - How Tough Is It?
By Trend Micro Australia | 22/10/2012

Advanced persistent threats (APTs) refer to a category of threats that pertain to computer intrusions by threat actors that aggressively pursue and compromise chosen targets. APTs are often conducted in campaigns, which consist of a series of failed and successful attempts over time to get deeper and deeper into a target’s network and are therefore not isolated incidents. Download to find out more!

Download this now

Most Popular Reviews

Join the newsletter!

Error: Please check your email address.

Latest News Articles

Resources

PCW Evaluation Team

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?