White Papers

Featured White Papers



2017 Vulnerability Management Survey Infographic
By Rapid7 | 2/6/2017

Cloud Security and Staff Security Training are the 2 biggest challenges facing Australian organisations in 2017, according to the CSO and Rapid 7 Vulnerability Management Survey.

Download this now


Solution brief: Threat Centric Vulnerability Management
By Skybox Security | 10/7/2017

When it comes to vulnerability management, security leaders continue to struggle to identify which of the thousands — even millions — of vulnerabilities in their environment are actu-ally putting the organisation at risk. Traditional approaches don’t take into account all factors that influence vulnerability risk. This leaves security teams wasting resources on issues attackers may never find or want to exploit.

Download this now


It's Time to Align Your Vulnerability Management Priorities With the Biggest Threats
By Skybox Security | 10/7/2017

Vulnerabilities and their exploitation are still the root cause of most breaches. IT security leaders should refocus their attention on how vulnerabilities are being managed and should track this metric to provide visibility as to how to reduce the biggest risks of being breached.

Download this now


CASE STUDY: Sub-Zero Reduces Time Spent Investigating Incidents with LogRhythm
By LogRhythm | 10/5/2017

As Sub-Zero Group, Inc grows and the network becomes more complex, the inhouse IT security staff remains lean. For the IT security team monitoring the network, it was becoming too cumbersome to work with separate device logs and monitoring tools. They couldn’t extract the information on network activity quickly or easily. Setting up a solution with LogRhythm has significantly improved the efficiency of Sub-Zero’s security operations.

Download this now


It’s Time for a Smarter Approach: Threat-Centric Vulnerability Management
By Skybox Security | 10/7/2017

Your approach to vulnerability management may be putting your organisation at greater risk. Just dealing with vulnerabilities that a vendor said were “critical” isn’t enough and may still leave you susceptible to an attack. Attackers are embracing ransomware and other forms of distributed cybercrime made readily available as packaged exploit kits and services on the dark web. These attacker tools target low–hanging fruit by exploiting a surprisingly small number of vulnerabilities, many of which wouldn’t be tagged as a high priority in a purely vulnerability–centric approach.

Download this now

Market Place

[]