Malware Whitepapers


Sort by: Date | Company | Title


What solutions are Australian companies using to secure network endpoints?
By Webroot | 29/10/2015

Almost 50% of Australian security executives are concerned about the current state of their company’s security in dealing with advanced attacks. Find out in this infographic the survey results of how respondents feel about dealing with security breaches effectively.

Download this now


Advanced endpoint protection for dummies
By Palo Alto Networks | 26/10/2015

Cyberattacks have evolved to become much more complex, however the core techniques employed by malware are usually recycled and largely unchanged.

Find out how these targeted attacks affect companies in real world cases and why legacy solutions that focus on detection are insufficient to protect secure enterprise data. Included are also 10 preventative measures you can take to prevent a corporate security breach.

Download this now


The definitive guide for evaluating cybersecurity solutions
By Palo Alto Networks | 26/10/2015

Cyber criminals today are deploying sophisticated attacks on enterprises making the role of security professionals much more complex than ever before. Find out the 10 requirements your cybersecurity solution must meet to ensure secure application enablement at every location and how you should widen your RFP selection criteria when choosing a security provider.

Download this now


Designing a secure DNS architecture
By Infoblox | 19/10/2015

With globalisation growing, an inefficient DNS system that fails to support the influx of online visitors can be detrimental to business operations, revenue and online reputation. Find out what you must know to design a scalable and secure DNS architecture that not only satisfies your current business needs but also takes into account future expansion plans.

Download this now


Stopping the next massive cyberattack
By Check Point Software Technologies | 28/4/2015

Cybercrime is now a leading menace of 21st century businesses. Perhaps even more unsettling, many cybercrime victims have been breached despite sizeable security investments and best-of-breed product deployments. For this reason, the sophistication of recent attacks has created a widespread sense of fear and distrust among consumers.

Download this now


A Spotlight on Malware Attack Vectors in Key Industries
By Palo Alto Networks | 5/1/2015

This edition of the recurring Threat Landscape Review examines data from WildFire™, a key component of the Palo Alto Networks threat intelligence cloud, to identify how organizations in different industries are targeted and affected by malware.

Download the latest research from Unit 42 to see current trends and malware distribution patterns across 10 industries, and find out what you need to know about the Kuluoz malware family, and how to defend against it.

Download this now


Zero Second Day? More like Zero Second
By Check Point Software Technologies | 14/12/2014

What can malware do in 60 seconds? One minute can change everything for a business. The speed of business is all about being responsive to customers and stakeholders. So what happens when the speed of business is overtaken by the speed of malware? Given the unprecedented growth in the number of security threats that focus on stealing data, sabotaging business continuity and damaging a company’s reputation, what should organizations do to ensure the speed of malware doesn’t disrupt the speed of business? T

Download this now


The 300 Unknown Malware Test
By Check Point Software Technologies | 14/12/2014

New attack types combine known and unknown threats to exploit “unknown” vulnerabilities. Attackers are also hiding malware inside documents, websites, hosts and networks. These attacks have many purposes such as financial and ideological motives. They focus on stealing data, sabotaging business continuity, or damaging a company’s reputation.

Download this now


Fight malware, malfeasance, and malingering with F5
By F5 Networks | 12/11/2014

Organisations are seeking greater control over their outbound security. They’re looking to find solutions that offer the greatest protection and control to prevent data loss, ensure compliance and increase productivity. Where should they start? •Every year brings an even more extreme set of threats to the enterprise than the last •The push for increased confidentiality and the use of SSL everywhere has made it more difficult for enterprises to monitor Internet usage •While there are solutions that can help mitigate some of these risks, it’s critical for enterprises to adopt a comprehensive and streamlined way to maintain visibility and control

Download this now


Ponemon Institute Report: 2014 Cost of Data Breach Study: Australia
By IBM Australia | 2/5/2014

This whitepaper discusses the results from the 2014 Cost of Data Breach Study: Australia. In this year’s report, the fifth of its kind, the total average cost paid by a company in a breach increased to $2.8 million, while assessing the likelihood of a company having data breaches in the next 24 months.

Download this now

Market Place

[]