Menu

White Papers

Featured White Papers



Strengthen your defenses against cybercrime
By Mimecast | 18/8/2017

Operating and securing a business in the cloud can be hard. The rapid evolution of cyberthreats, inevitability of technical failure, and potential for human error are risk factors that organisations simply can’t ignore. These risk factors can cause irreparable damage like business disruption, lengthy downtime and data loss. Plus, the complexity and cost involved with addressing these

Download this now


Electronic Signatures in Australia: Legal considerations and recommended best practices
By Adobe | 20/3/2018

In this paper, we will review the law as it relates to electronic signatures by analysing how such signatures are treated under the Commonwealth and State electronic transaction legislation and how signatures are treated under general law.

Download this now


Vulnerability and threat intelligence feed for accurate prioritisation and fast migration
By Skybox Security | 10/7/2017

To deploy resources in the right place, in the right way, vulnerability management teams need to know the intersection of vulnerabilities, network context and the threat landscape.

Download this now


The Mimecast email security risk assessment
By Mimecast | 18/8/2017

Many organizations think their current email security systems are up to the task of protecting them. Unfortunately many email security systems fall short and do not keep their organisations safe. The reality is the entire industry needs to work toward a higher standard of quality, protection and overall email security. The proof is in the numbers, and Mimecast is establishing a standard of transparency for organisations and raising the bar for all security vendors.

Download this now


How to make your business more secure using Dell & Windows 10
By Dell | 4/8/2017

Effectively securing your enterprise is a continuous effort that requires constant attention and improvements. Rapid technological change can resolve business problems and pave the way towards digital transformation, but it also creates new points of potential vulnerability – which can create new security problems that interrupt or disable the business.

Download this now
Computerworld
ARN
Techworld
CMO