Menu

Whitepapers


Sort by: Date | Company | Title


Automating Cloud Security to Mitigate Risk | SANS Whitepaper
By Skybox Security | 27/7/2017

As cloud computing services evolve, the cloud opens up entirely new ways for potential attacks. In February 2017, Tavis Ormandy of the Google Project Zero team exposed major memory leakage in Cloudflare’s Content Delivery Network (CDN) web caching services. It exposed all sorts of sensitive data, including passwords, authentication tokens and cookies. Although this is just one example of a cloud-oriented service with a major security issue (which, for the record, the company responded to immediately and remediated quickly), it demonstrates that all of us may have more exposure points than we realise.

Download this now


ENTERPRISES RE-ENGINEER SECURITY IN THE AGE OF DIGITAL TRANSFORMATION
By BMC Australia | 26/7/2017

It’s no secret that CEOs across North America and Europe have been marshal-ing forces for digital transformation in a high-stakes battle to ward off ambitious insurgents, maintain market share and address the changing demands of today’s customers. This is a once-in-a-generation challenge for any business leader, but it’s not the whole story. Behind the scenes, a fourth imperative is being added to the list of transformation considerations—combating modern cybercriminals.

Download this now


The hunt for IOT | The networks building deathstar-sized botnets from IOT minions
By F5Labs | 19/7/2017

For over a year now, F5 Labs and our data partner, Loryka, have been monitoring the ongoing hunt by attackers to find vulnerable IoT devices they can compromise. In our first report, DDoS’s Newest Minions: IoT Devices, our research proved what many security experts had long suspected: IoT devices were highly vulnerable to exploit, the level of interest in exploiting them was high, and distributed denial-of-service (DDoS) attacks using these devices were already occurring. Our findings and conclusions in Volume 11 rang true, and the new numbers show even steeper growth than we had imagined.

Download this now


How quantum computing will change browser encryption
By F5Labs | 19/7/2017

The NSA’s Information Assurance Directorate left many people scratching their heads in the winter of 2015. The directive instructed those that follow its guidelines to postpone moving from RSA cryptography to elliptic curve cryptography (ECC) if they hadn’t already done so.

Download this now


Ransomware: A growing Enterprise threat
By CrowdStrike | 13/7/2017

A deep dive into ransomware's evolution and why businesses can't afford to ignore it

Download this now


Who Needs Malware?
By CrowdStrike | 13/7/2017

HOW ADVERSARIES USE FILELESS ATTACKS TO EVADE YOUR SECURITY

Download this now


Telstra Cyber Security Report 2017
By Telstra Corporation | 13/7/2017

Managing risk in a digital world.

Download this now


CrowdStrike Falcon Overwatch
By CrowdStrike | 13/7/2017

STOP INCIDENTS BEFORE THEY TURN INTO BREACHES

Download this now


CrowdStrike Falcon Prevent Next-Generation Antivirus
By CrowdStrike | 13/7/2017

GET BETTER PROTECTION AND BETTER PERFORMANCE IMMEDIATELY BY REPLACING YOUR CURRENT AV SOLUTION WITH CROWDSTRIKE FALCON PREVENT

Download this now


CrowdStrike Falcon Insight Endpoint detection and response
By CrowdStrike | 13/7/2017

STREAMING THE THREAT DETECTION AND RESPONSE LIFECYCLE WITH SPEED, AUTOMATION AND UNRIVALED VISIBILITY

Download this now