Risk Management Research
-
An Overview of Barracuda PhishLine
Sponsored by: BarracudaThe following video will help you prepare for a range of threats with patented, highly-variable attack simulations for multiple vectors—including phishing, smishing, vishing, and found physical media. View it now to learn how to put them to use in your organization.
-
Barracuda Lightboard: Total Email Protection
Sponsored by: BarracudaThis video discusses the evolution of advanced email threats, so tune in to learn how to establish multi-layered protection to thwart them before they infiltrate your organization.
-
Spear Phishing: Top Threats and Trends Vol. 1
Sponsored by: BarracudaThis report takes an in-depth look at the three most prevalent types of spear phishing attacks—brand impersonation, business email compromise, and blackmail—and examines 8 defense strategies for preventing these attacks. Read on to learn how to put these strategies to work to protect your company.
-
Best Practices for Protecting Against Phishing, Ransomware and Email Fraud
Sponsored by: BarracudaDownload this Osterman Research white paper to learn more about the growing success of cyber threats, the top incidents that are concerning decision makers, and 10 tactics for fending off these advanced attacks.
-
Understanding and Preventing Finance Phishing Fraud
Sponsored by: BarracudaToday's hackers and cybercriminals are doubling-down to heavily target finance department employees and execs with fraudulent phishing emails. Why? To get the whole story on this fast-growing phishing threat and to view several new strategies for fighting back, join this webinar.
-
Keeping Users Safe from Advanced Threats and Unsolicited Content
Sponsored by: Barracuda NetworksHow can you stop advanced malware from breaching your network perimeter and stealing your valuable data? The following paper explains how to confront—and thwart—these threats using a cloud-based firewall that combines multiple layers of detection for all threat vectors with on-the-fly sandbox execution of unknown files.
-
Eissmann Group Automotive Places Trust in Barracuda's CloudGen Firewall
Sponsored by: Barracuda NetworksOf the utmost importance to the Eissmann Group was obtaining a reliable intrusion prevention system, improving performance, and managing their distributed environment with ease. Read this case study to discover how they ultimately achieved their objectives with a cloud-based firewall.
-
Overview of Barracuda Advanced Threat Protection
Sponsored by: Barracuda NetworksThe following white paper highlights a multi-layer advanced threat protection approach designed to defend against all threat vectors and across multiple deployment surfaces. Read on to see how your organization could benefit from this four-layered approach.
-
Enterprise Tokenization with SecurDPS
Sponsored by: Comforte AGOrganizations are investing more than ever to protect their sensitive data, to meet compliance demands and to manage risk that is associated with cyberattacks. In this white paper, learn about comforte's data protection suite which is a scalable and fault-tolerant enterprise tokenization and encryption solution enabling successful data protection.
-
Leading Canadian Bank Achieves Compliance for Themselves and their Customers
Sponsored by: Comforte AGTo achieve PCI compliance while reducing the risk of data breaches and potential fraud, a Canadian bank implemented comforte's platform which replaced sensitive data with tokens to render it unreadable anywhere stored. In this case study, explore the benefits the bank saw after implementing comforte.
-
IAM: Key to security and business success in the digital era
Sponsored by: ComputerWeekly.comAs more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.
-
How to Reach Cybersecurity Maturity in 5 Critical Steps
Sponsored by: Dell SecureWorksSecurity is often stuck in a defensive and preventive state that leaves organizations unable to detect and respond appropriately to cyberattacks and incidents. In this white paper, find out how you can adjust your organizations security maturity level with just 5 key steps and change the state of your security.
-
8 Simple Steps for Automating Governance, Risk and Compliance (GRC)
Sponsored by: ServiceNowDiscover 8 simple steps to slash audit costs, improve efficiency, and minimize risk within your organization by automating your GRC.
-
Computer Weekly – 14 August 2018: Infrastructure under attack
Sponsored by: ComputerWeekly.comIn this week's Computer Weekly, we look how a honeypot designed to look like an electricity substation was sold on the dark web to infiltrate a secure operational system. We also take a look at how Google is finding a way into the enterprise cloud and we investigate why simulation models need to co-exist with AI-based models. Read the issue now.
-
The Hotel Hijackers
Sponsored by: Panda SecurityBetween booking rooms in person and online and making electronic payments at shops and restaurants, the hacking possibilities at hotels are endless. Tap into this report to learn about how 8 different hotels handled cyber-attacks, and how you can use cybersecurity services to avoid an attack.
-
Network Security: Spotlight on Australia/New Zealand
Sponsored by: ComputerWeekly.comIn this e-guide learn more about how security leaders are turning to AI to take out the bad guys, how blockchain can help secure an IoT network, and whether network security strategies are keeping up with emerging cyber threats.
-
Disaster Recovery/Business Continuity: Spotlight on ANZ
Sponsored by: ComputerWeekly.comIn this e-guide, read about the IT outage at Woolworths that shut down checkouts and forced shoppers to leave their groceries behind, what you can do to avert a disaster through a recovery plan and the top business continuity risks you should be aware of this year.
-
Data protection & compliance for Australian/New Zealand businesses
Sponsored by: ComputerWeekly.comIn this e-guide, read more about the state of data breaches in Australia and what firms need to do to stay on the right side of new data breach notification regulations coming into force in Australia and globally.
-
HTTP Security Headers Guidelines: An Informative Tutorial
Sponsored by: TechTargetIn our exclusive expert guide, Who, What & How of HTTP Security Headers, Judith Myerson outlines how to defend your websites using strong HTTP security headers. To claim your free PDF download, we ask that you participate in our multiple-choice survey.
-
Facing up to emerging technology: Risks and benefits
Sponsored by: SearchCIOCutting-edge technologies offer companies competitive advantages but also present security threats. Learn how to mitigate emerging technology risks.
-
6 Ways to Prevent Ransomware in Health IT
Sponsored by: Cisco UmbrellaWith so much at risk for healthcare organizations, IT must implement proactive steps to help mitigate their risks and keep attacks at bay. In this e-guide, you'll uncover the ins and outs of 6 ransomware prevention tips healthcare organizations should include as part of their ongoing security strategy.
-
How to Make a SIEM System Comparison Before you Buy
Sponsored by: SearchSecurity.comConsidering a SIEM system that employs machine learning? It's a great idea, but your SIEM will still need considerable human input to be effective. Open this security buyer's handbook to learn what SIEM features are essential for your company.
-
ITSM strategy for an agile, secure digital transformation
Sponsored by: SearchCIO.comAs digital transformation forces companies to rethink IT ops, balancing reliability and speed will be vital to successfully updating their ITSM strategy.
-
Automation in Cybersecurity
Sponsored by: Juniper NetworksDuring his RSA Conference keynote, Juniper CEO Rami Rahim encouraged leaders to be "agents of change" that embrace automation in cybersecurity and new training techniques. Find out how automation in cybersecurity emphasizes the working relationship between AI and humans to prevent attacks.
-
The Security Benefits of DLP
Sponsored by: InteliSecureSecurity breaches continue to harm enterprises, leaving organizations scrambling to safeguard their data from unauthorized disclosure. This e-guide offers expert insight into DLP implementation and how it can secure sensitive data from costly, detrimental breaches.