Archivio whitepaper

Argomenti più recenti:

Planning for Office 365 Gaps

There is a major shift happening in the world of enterprise IT systems. Many organizations are trading on-premises systems for cloud-based solutions, a move that brings virtually limitless scalability, storage and accessibilit...

Visualizza whitepaper

Best Practices for Implementing Security Awareness Training

What if your employees were more informed about security threats, more skeptical about what they receive in email, and less likely to click on malicious links in email without first verifying them? There are some impactful, qu...

Visualizza whitepaper

Threat Intelligence: How Every CISO Can Make it a Priority

“As a security industry, we have to move away from being in a constant state of reaction. I want to minimize damage to my organization—I want prevention.” - Malcolm Harkins, Chief Security and Trust Officer, Cylance Big budge...

Visualizza whitepaper

6 Tips To Fend Off Security Threats Without Paying A King's Ransom

The threat of ransomware is still – unfortunately – alive and well. According to a 2018 study by SentinelOne, their survey of decision makers working in IT and risk, fraud or compliance functions found that six in ten (56%) rep...

Visualizza whitepaper

NISD: Networking and Information Systems (NIS) Directive

The NIS Directive provides legal measures that will boost the overall level of cybersecurity in the EU, particularly for industries and organisations that provide services essential to everyday life and the security of a nation...

Visualizza whitepaper

Threat Hunting 101: 8 threat hunts you can do with available resources

Threat hunting is the process of proactively searching for malware or attackers that reside on your network. The generally accepted method is to leverage a security information and event management (SIEM) solution that centrall...

Visualizza whitepaper

Edge-based industrial machine vision applications

Machine vision systems are pervasive. You’ll find them everywhere you go and they are part of everything you use. From spam filters to image recognition and processing, they have permeated our daily lives, whether at home, at w...

Visualizza whitepaper

Who you gonna call? Why we need a cyber emergency service

What options do companies have to respond to, remediate, and mitigate against breaches and being hit by compliance fines? SMEs need protecting more than ever. The volume and viciousness of cyberattacks and data reaches means t...

Visualizza eBook

Southern Cross Care ensures healthy endpoints

Business challenge Boosting productivity by minimizing threats Healthcare organizations are the most targeted by cyberattackers. For Southern Cross Care, defending systems across 31 residential aging locations was a huge chal...

Visualizza caso studio

Cybercrime tactics and techniques

Enterprises, beware. Threat actors are continuing to eye businesses for high returns on investment in Q1 2019, breaching infrastructure, exfiltrating or holding data hostage, and abusing weak credentials for continued, targeted...

Visualizza whitepaper
Registrati alla newsletter
Le principali notizie, gratuitamente via mail