Security Whitepapers


Sort by: Date | Company | Title


The definitive email security ebook
By Proofpoint Pty Ltd | 27/10/2017

The Problem: Attacks are evolving faster than email defenses. Organizations are spending more on cybersecurity than ever, even as losses from data breaches, business disruption, and fraud continue to mount.

Learn how to prevent the top email fraud tactics including:

Business Email Compromise techniques Advanced Malware including Ransomware Outbound Phishing Get the 5 steps to building your email security strategy across the entire attack chain – from prevention through real-time response.

Download the Definitive Email Security Strategy Guide now.

Download this now


The Human Factor Report 2017 Infographic
By Proofpoint Pty Ltd | 19/10/2017

The headline stories of the threat landscape in 2016 were of the explosive growth of ransomware, the massive email campaigns that distributed it to organisations of all sizes, and the exponential increase in email fraud attacks that have cost businesses billions in theft, disruption and reputational damage. Criminals are now targeting individuals, not companies or infrastructure. See key findings from our Human Factor Report.

Download this now


Human Factor Report 2017
By Proofpoint Pty Ltd | 19/10/2017

The headline stories of the threat landscape in 2016 were of the explosive growth of ransomware, the massive email campaigns that distributed it to organisations of all sizes, and the exponential increase in email fraud attacks that have cost businesses billions in theft, disruption and reputational damage. Criminals are now targeting individuals, not companies or infrastructure. See key findings from our Human Factor Report.

Download this now


Electronic Signature Guide for Banks
By eSign by Vasco | 12/9/2017

Today, your customers want service quickly, at their convenience. Customers need to be able to do everyday banking, open accounts, sign loans and more, from anywhere, at any time, on any device. They are seeking the omni-channel experience, with the flexibility to start a transaction in one channel and complete it in another. As a result, the traditional way of signing forms and documents is changing – from paper to paperless. Read more here

Download this now


Guide to Electronic Signatures
By eSign by Vasco | 12/9/2017

The trend to digitise and transform business is accelerating. Government and business leaders, analysts and industry associations agree: it is time to remove paper from everyday processes like contracting, HR, invoicing and transactions with customers and citizens. As a result, the traditional way of signing documents is changing – from paper to paperless.

Download this now


8 Things CIOs Need to know about Whaling
By Mimecast | 16/6/2017

Security is an ever-evolving threat landscape. Even with the best in-breed security systems, there is still a possibility that your company is at risk. This whitepaper covers the 8 important things CIOs need to know about whaling and some useful tips they can use to protect their organisation from being held ransom to such attacks.

Download this now


The Threat Lifecycle Management Framework
By LogRhythm | 10/5/2017

Prevent major data breaches by reducing time to detect and respond to threats.

You can lessen your organisation's risk of experiencing a damaging cyber incident or data breach by investing in effective Threat Lifecycle Management. Although internal and external threats will exist, the key to managing their impact within your environment and reducing the likelihood of costly consequences is through faster detection and response capabilities.

Download this now


CASE STUDY: Sub-Zero Reduces Time Spent Investigating Incidents with LogRhythm
By LogRhythm | 10/5/2017

As Sub-Zero Group, Inc grows and the network becomes more complex, the inhouse IT security staff remains lean. For the IT security team monitoring the network, it was becoming too cumbersome to work with separate device logs and monitoring tools. They couldn’t extract the information on network activity quickly or easily. Setting up a solution with LogRhythm has significantly improved the efficiency of Sub-Zero’s security operations.

Download this now


5 Key Considerations for Effective Security in a Mobile World
By Dilignet | 16/3/2017

The way in which people work has changed. The mobile workforce is a reality. Yet while new ways of working bring many benefits, they demand a new approach to security.

For instance, how do you secure your data and applications on the internet? What happens if a device gets stolen? How do you ensure documents are secure if they are used in public environments? Can you provide quality technical support to users who are working from home? How will your employees ensure that their work and private information remains separate?

Read this whitepaper to find out more.

Download this now


Top 5 Steps to Reduce File Data Leakage Risks
By FinalCode | 26/9/2016

Given the necessity of file sharing, respective risks and obligations, and available file protection mechanisms, what is a pragmatic approach for organizations to reduce IP loss, privacy compliance liability and business exposure due to sensitive file data leakage. Here are the top 5 steps that your organization can put in place today.

Download this now
[]