Risk Management Research
-
Tax Automation reduces costs and meets security and compliance requirements
Sponsored by: PulsantIn this case study, follow Tax Automation, a tax software company based in the UK, as they partner with Pulsant to streamline the delivery and accessibility of their offerings through a transition towards a SaaS model. Read on to discover the Tax Automation’s challenges, required capabilities and results.
-
The Latest Trend in Network Cybersecurity: NDR
Sponsored by: FidelisIt is not enough to merely detect threats quickly – response must be just as swift. Network detection and response (NDR) has grabbed the attention of network professionals. It utilizes automation and proactive capabilities to detect threats and add them to the ‘playbook’ once they’re found. Glimpse at this white paper to learn more.
-
IT/OT convergence is necessary, but not so simple
Sponsored by: ComputerWeekly.comThis handbook outlines best practices for building a secure IT/OT convergence and integration strategy, as well as insights into why people may just be the most critical piece of the IT/OT convergence security equation.
-
Fighting Fraud
Sponsored by: DtexIn this issue of the Fighting Fraud e-newspaper, observe a series of articles dedicated to highlighting the global trends, challenges and advancements as they relate to fraud. Key topics covered in this issue include Brexit, artificial intelligence, insider threats, the true cost of cybercrime, and more.
-
Everyone as a Trusted Insider
Sponsored by: DtexInsider threats are on the rise, and traditional monitoring is too reactionary to handle today’s sophisticated attack methods. In this report, take a closer look at Dtex’s replacement to traditional employee monitoring – designed to promote employee privacy, proactive threat prevention, behavioral understanding of threats, and more.
-
Dtex Intercept Next-Gen Insider Threat Platform
Sponsored by: DtexInsider threats, both malicious and accidental, are a growing concern amongst today’s organizations. The following solution brief highlights the key features and capabilities of Dtex Intercept, an insider threat platform designed to equip users with the ability to proactively identify, categorize and isolate potentially harmful insider behavior.
-
CipherTrust Data Discovery and Classification from Thales
Sponsored by: ThalesTo meet today’s regulatory, privacy and security needs requires greater visibility into and understanding of key risk areas. This 5-minute video provides a brief overview of the key features and capabilities of Thales’ CipherTrust Data Discover and Classification, a dashboard designed to help organizations address these challenges.
-
BlackBerry MITRE ATTACK APT29 Evaluation
Sponsored by: BlackBerryIn conjunction with the framework, MITRE ATT&CK also conducts security evaluations without commentary or bias – the purpose is to provide objective information regarding how vendors fare against certain threat techniques. Download this report for BlackBerry’s analysis and interpretation of MITRE ATT&CK APT29 evaluation data.
-
The Role of Insider Threat Management Software Platforms
Sponsored by: ProofpointAs workplace trends and cyberthreats evolve, so too should the methods used to mitigate risk and ensure user protection. This e-book takes a closer look at the growing risk of insider threats and explores the capabilities of the ObserveIT platform, Proofpoint’s insider threat management software platform.
-
Insider Threat Management and Cybersecurity Tools
Sponsored by: ProofpointThe traditional notion of a perimeter is a thing of the past, people are the new perimeter. In this e-book, discover the tools and tactics organizations are using to defend against insider threats – evaluating the strengths and weaknesses of each approach and underlining the importance of people-centric security.
-
How to Re-establish Your Network and Security Perimeter
Sponsored by: InsightData protection is being prioritized now more than ever. Organizations are looking for ways to improve their posture and maintain their business integrity by managing investments based on the correct risk profile. But when it comes to security, correctness takes time. Watch this webcast for a pragmatic approach to privacy and security.
-
An Overview of Insider Threat Management
Sponsored by: ProofpointThe average cost of an insider-caused cybersecurity incident has grown to $11.45 million – and these attacks are becoming more frequent, too. In this e-book, enhance your understanding of insider threats by looking at industry specific concerns, common use cases, the increasingly popular people-centric approach, and more.
-
A Guide to Setting Up Your Insider Threat Management Program
Sponsored by: ProofpointIn this past 2 years, the average cost of insider threats grew to a devastating $11.45 million per incident (the frequency also increased too). Download this e-book to learn more about the varying types of insider threats, how to set up an insider threat management program, best practices, and more.
-
How to Detect The 7 Types of Document and Identity Fraud
Sponsored by: OnfidoDocument and identity fraud have the potential to be one of the most disruptive risks facing organizations. However, addressing these challenges while meeting the user experience demands of customers is a tall order. Download this resource for a closer look into detecting and mitigating the most common types of fraud.
-
MITRE ATT&CK: Security Evaluation Overview
Sponsored by: BlackBerryMITRE ATT&CK offers an unbiased, detection-based evaluation designed to provide organizations with insights and information regarding their vulnerabilities – it’s not a competitive analysis with winners, scores or ranking. Watch this webinar, which features 2 BlackBerry experts, for a comprehensive overview of MITRE ATT&CK Evaluations.
-
MITRE ATT&CK: The Power of Prevention
Sponsored by: BlackBerryIn this brief webinar, join industry experts as they provide insight into optimizing the MITRE ATT&CK framework using artificial intelligence and machine learning – providing an overview of the framework and why it’s important, as well as the role of AI for enhance threat detection and prevention.
-
Panelist Discussion with Q&A
Sponsored by: BlackBerryIn this 14-minute panelist discussion with Q&A, join industry experts as they provide insight into commonly asked questions and hot topics surrounding the MITRE ATT&CK framework – discussing topics from hypothetical testing scenarios to its efficacy as a resource during the COVID-19 pandemic, and more. Watch now to get started.
-
Quantum Computing and Quantum-Safe Security
Sponsored by: ThalesAlthough quantum computer will have many benefits, it will also have the ability to do harm. The very same computing power that allows complex problems to be solved can, in turn, be applied to undermine cybersecurity. In this white paper, learn more about quantum computing and the implications it will have on the cybersecurity landscape.
-
Is Your Front Door Open and Unlocked for Cyber Criminals?
Sponsored by: VerizonWhen it comes to cyber security, small businesses represent 43% of all data breaches because their false sense of security leads them to not put proper defenses in place. In this blog, learn why cyber criminals often target SMBs before going after larger organizations.
-
Mobile Security Index 2020
Sponsored by: VerizonMobile technology and the cloud are enabling and medium-sized businesses to grow and compete with larger enterprises more effectively. But unless they take further steps to secure their mobile devices, SMBs could face significant damage to their reputations and bottom lines before the competition even begins.This infographic explains in detail.
-
5 Reasons Your SMB Workspace Needs Simple SSO
Sponsored by: CitrixSSO should make life easier for both IT and employees. But when new apps require different SSO tools from different vendors, it can complicate your IT. Adopting simple, unified SSO for your workspace can ensure secure, anywhere access to all essential applications.This e-book gives five reasons why your organization needs simple, unified SSO.
-
5 Things Better Connectivity Can Help You Achieve
Sponsored by: VerizonBy 2025, the average connected person will interact with a connected device nearly 4,800 times per day—about once every 18 seconds. If your organization’s network is not amply prepared, you will be at risk of falling behind. Access this infographic for 5 business advantages of increasing connectivity and how they impact your bottom line.
-
CW ANZ, July 2020: Expert Advice on Security
Sponsored by: ComputerWeekly.comIn this handbook, Computer Weekly looks at how organisations in Australia and New Zealand can better protect themselves against evolving cyber threats.
-
Royal Holloway: Driverless vehicle security for military applications
Sponsored by: ComputerWeekly.comExisting attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.
-
You've Got BEC!
Sponsored by: ProofpointBEC attacks have become bigger and costlier than ever. Toyota Boshoku, a subsidiary of the car manufacturer, lost $37 million to a BEC scam. Toyota is one of many companies that has suffered a loss from this type of email fraud. The good news? There is a layered approach to keep your email accounts and data safe. Open this e-book to learn more.