Skip the navigation

Cybercrime and Hacking White Papers

Cybercrime and Hacking white papers and technology resources for implementing and optimizing Cybercrime and Hacking strategy, solutions, Cybercrime and Hacking products, and more.

Comprehensive Advanced Threat Defense

The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). There are many definitions, and plenty of marketing hype and spin on the topic, but it's the science - and the art - of defending yourself against sophisticated, persistent adversaries who can get past (or have already gotten past) your security defenses.
We like to define advanced threat defense in terms of the adversary rather than the attack technique used to remind ourselves that what we are really up against is a person or, more likely, a group of people who are specifically targeting your organization, and will use whatever attack vectors and techniques necessary to achieve their objectives.
This paper describes a comprehensive, network-­based approach to Advanced Threat Defense.

Sponsor: General Dynamics Fidelis Cybersecurity Solutions


 

Advanced Threat Defense: A Comprehensive Approach

In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive approach to network advanced threat defense.

Sponsor: General Dynamics Fidelis Cybersecurity Solutions


 

2013 Cyber Risk Report

The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat landscape. It provides information you need to effectively plan your cyber security strategy and deploy your defenses.

Sponsor: HP


 

Cybersecurity for Dummies eBook

APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. These threats, and the cyber-criminals behind them, are experts at remaining hidden from traditional security while exhibiting an intelligence, resiliency, and patience that has never been seen before.

Controlling these threats requires multiple security disciplines working together in context. While no single solution will solve the problem of advanced threats on its own, next-generation security provides the unique visibility and control of, and the true integration of, threat-prevention disciplines needed to find and stop these threats - both known and unknown.

Sponsor: Palo Alto Networks


 

Who's Spying on You?

You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations. Download this report to learn more.

Sponsor: Kaspersky


 

The Threat Landscape

Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with new malware and evolving cybercriminal tricks? Download Kaspersky's Guide to the Threat Landscape to learn more.

Sponsor: Kaspersky


 

IT Security by the Numbers: Calculating the Total Cost of Protection

Kaspersky Lab has created an eBook to help you calculate the true cost of protecting your business infrastructure, intelligence, and reputation. Download "IT Security by the Numbers: Calculating the Total Cost of Protection" to learn more.

Sponsor: Kaspersky


 

Protecting Your Mid-Size Business from Today's Security Threats

Security breaches in large enterprises make the headlines, but 55% of small and mid-size businesses have also experienced a data breach. And 60% of small businesses fail within six months of falling victim to a cyber attack.
This e-book examines the security challenges unique to mid-size companies and the steps you should take to protect your business. Read it to learn:
* Why mid-size companies are just as vulnerable to cyber attack as the big brands
* The tactics cyber thieves use
* The differences between security and compliance
* How security solutions meet the needs of mid-size organizations and can protect your business

Sponsor: HP


 

The Importance of Reputation

A study by Verizon finds 86% of security breaches come from the outside. Spotting cyber attacks in your network means identifying the signatures of known threats. Reputation data takes that one step farther by identifying communications coming from or going to known bad actors based on their reputations. This white paper explains:
* How reputation data makes security more proactive
* How to evaluate reputation security services
* How HP ArcSight Security Information and Event Management (SIEM) applies reputation data to prevent exfiltration of data from infected internal machines to sites with bad reputations
Read this white paper now for more details.

Sponsor: HP


 

SBIC: Transforming Information Security

This report, the third and final in a series on Transforming Information Security, combines perspectives on technologies with experience in strategy to help security teams navigate complex decisions regarding technology deployments while maximizing investments.

Sponsor: RSA Security, Inc.


 

Is Your Credit Card Data Safe from Hacks?

News of recent credit card hacks has rocked consumer confidence. Even talk of a security breach can bring on a PR firestorm. What can you do to make sure your customers and clients are protected? The 12 Payment Card Industry (PCI) Data Security Standard (DSS) requirements along with the right Application Performance Monitoring (APM) solution can help keep you one step ahead of the hackers.

Sponsor: Network Instruments


 

CSO QuickPulse IT Security: Midsize Businesses Face Enterprise

The number of cyber attacks against midsize companies has doubled in the last year. And cost per employee is more than three times that of larger companies. While midsize companies often lack the sophisticated defenses of large enterprises, many fail to recognize their vulnerability and are overconfident in their ability to spot and counter threats.
This white paper uses survey data to examine the security posture of midsize companies. Read it to learn:
* How respondents view their security defenses
* How many experience security breaches
* Why midsize companies need effective security information management
* The four important insights about midsize company security

Sponsor: HP


 

10 Ways to Build a Better Big Data Security Strategy

When it comes to enterprise security, Big Data is part of the problem-and it is part of the solution. Collecting vast amounts of data from disparate sources-including the cloud-exposes the enterprise to new threats and creates vast new stores of data you must protect. But you can apply Big Data techniques for finding insight in mountains of data to find security threats as well.

Sponsor: HP


 

eBook: Security for a faster world

Business today is driven by a global economy that generates an unprecedented volume and variety of data with alarming velocity. The information in this dossier can help your security team adapt to a world that's evolving faster than ever before

Sponsor: HP