Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...

NETSCOUT Threat Intelligence Report

We want you to remember one number: 8.4 million. That is the number of DDoS attacks NETSCOUT Threat Intelligence saw last year alone: more than 23,000 attacks per day, 16 every minute.

10 Considerations for Cybersecurity Risk Management

Risk management is the process of identifying potential risks , assessing the impact of those risks, and planning how to respond if the risks become reality. It is important for every organization, no matter the size or industry, to develop a cybersecurity risk management plan.

White Paper | Presented by Validity

A Guide to CCPA: Understanding and complying with California’s new legislation

In recent years, a rash of high-profile data breaches has created new and growing concerns among consumers worldwide. While a federal US law has yet to be proposed, California is leading the way for the United States with their new law the California Consumer Privacy Act (CCPA) which provides consumers with rights over how their data is being used.

eBook | Presented by SecurityScorecard

Guide to Building TPRM Program in 2020 eBook

This e-book will show you how to improve your vendor risk management program in three parts and how to take it to a mature state, ready to handle the modern risk that lies ahead.

Hyper‑V: best practices for protection and security

Join us for a webinar discussing business continuity and disaster recovery in Hyper‑V environments from a general perspective.

Importance of Reputational Risk Monitoring & Management

News headlines about data breaches have increased customer awareness and concern around data privacy and security. Today, customers - both in business-to-business or business-to-customer situations - make their purchasing decisions based on cybersecurity.

eBook | Presented by Sprint

Take the fight to the cybercriminals

In this guide, we’ll explore what it takes to proactively protect a modern company’s data and assets from harm, while patrolling the ‘cyber-grounds’ to root out any threats that have already snuck inside. And above all, keep the business running...

eBook | Presented by Area 1 Security

The Long Con: A Guide to Business Email Compromise 3.0

No malicious links. No attachments. Nothing for advanced malware detection tools to sandbox. Business Email Compromise phishing, or BEC phishing, relies on social engineering and account takeovers of trusted partners to trick victims into transferring funds and disclosing other valuable information.

The Role of Cybersecurity in Enterprise Risk Management (ERM)

As businesses continue to undergo digital transformation, cybersecurity must be included in enterprise risk management . Without a comprehensive ERM program, organizations have no way to identify and assess the relationship between cyber risk and its impact on the business.

Whack-A-Phish? Why "Tuning" Email Security is a Losing Game

It’s striking how security vendors claim you can “tune” leaky email defenses. Whether those defenses are provided by a secure email gateway (SEG) or included with Office 365 or Gmail, trying to patch the breach after you’ve been attacked is like bringing a bandaid to a knife fight.

Load More