Your Search

White Papers


1 - 12 of 185 results


Items per page:

Sort By
  • 2017 Enterprise Phishing Resilience and...

    Company:   Cofense

    • C180

    In this report, you’ll learn: - How smart anti-phishing programs are lowering susceptibility to as low as 5% - The connection between reporting and ...

  • 2017 SSH Study - Reveals widespread...

    Company:   Venafi

    • D250

    A July 2017 survey of over 400 security professionals in the U.S., U.K. and Germany measured how well their organisations implemented security contro...

  • 2018 CISO Report

    Company:   Bugcrowd

    • H140

    Bugcrowd's annual CISO report outlining top investment goals and concerns.

  • 2018 Cost of Insider Threats: Global...

    Company:   ObserveIT

    • N60

    According to The Ponemon Institute’s report, “2018 Cost of Insider Threats: Global Organisations,” the average cost of an insider threat annually is $...

  • 3 Important Reasons for Privilege...

    Company:   Centrify

  • 5 Critical Steps of a Complete Security...

    Company:   Tripwire

    • E50

    Tackling the challenge of finding and resolving risk in enterprise while demonstrating compliance.

  • A Buyer's Guide to DMARC

    Company:   Red Sift

    • S159

    We’ve put our heads together and come up with a comprehensive buyer’s guide that’s perfect for any organization unsure about taking their first steps ...

  • A Risk-Aware Path To Cybersecurity...

    Company:   CMMI Institute

    • A100

    This white paper outlines the practical cybersecurity challenges in enterprises—challenges that are already acute and increase organizational and busi...

  • Adopt Robust Breach Detection and Meet...

    Company:   CounterCraft

    • G100

    GDPR, in its article 83, refers to the need for organisations to ensure that they have robust breach detection and investigation mechanisms in place. ...

  • Advanced Protection and Threat...

    Company:   Nuvias

    • E140

    Kaspersky Lab products for business are designed for businesses of all sizes, from networks that comprise only a handful of workstations to the most c...

  • AI and the problem with Privacy

    Company:   Gemserv

    • H166

    This article discusses how the General Data Protection Regulation (GDPR), if properly enforced, can support organisations deploying artificial intelli...

  • An Adaptive and Layered Approach to...

    Company:   Bitdefender

    • D70

    The increased awareness around the need to fortify endpoint security is well-founded: Endpoints play a central role as the entry point through which ...

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.