White Papers

Featured White Papers



Using security metrics to drive action in ASIA Pacific
By Tenable Network Security | 8/5/2017

22 Experts Share How to Communicate Security Program Effectiveness to Upper Management.

Today’s cybersecurity challenges are more complex than ever before. Technologies like Development Containers, Cloud, BYOD, and BYOA have greatly complicated the security team’s ability to understand all of the potential IT attack surface.

We hope you find this e-book useful in helping you develop and communicate security metrics in your own organization.

Download this now


Translating Security Leadership into Board Value
By RSA | 12/5/2017

What Boards Want to Know and CISOs Need to Say

Seven years ago in the SBIC report Bridging the CISO-CEO Divide, we explored the best practices security leaders could use to communicate more effectively with their C􀀁Os. CISOs were at a crossroads and just beginning to take a seat at the executive table. We provided recommendations from global leaders about ways CISOs could embrace their growing leadership role, build trust with the executive leadership team and earn the confidence of their C􀀁O. We discussed how harting a new course based on a strategic, risk-based approach to information security would drive clear business value.

Download this now


SECURITY, DURABILITY AND USABILITY TARGET HP’S FLAGSHIP CONVERTIBLE AT BUSINESS USERS
By HP | 26/4/2016

Computer vendors have carefully straddled the line between laptop and tablet, distributing features in both directionsas end-user demand transitions from one form factor to the other. Recent consolidation around convertible devices, which combine both form factors into a single coherent unit, has turbocharged the tablet into a productivity tool that is gaining currency amongst business users whose primary needs include productivity tools and access to cloud services.

Download this now


Advanced endpoint protection test report
By Carbon Black | 12/5/2017

NSS Labs performed an independent test of the Carbon Black Cb Protection product. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Advanced Endpoint Protection (AEP) Test Methodology v1.0, which is available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Carbon Black’s inclusion. This report provides detailed information about this product and its security effectiveness. Additional comparative information is available at www.nsslabs.com.

Download this now

Market Place

[]