White Papers

Featured White Papers

Vulnerability and threat intelligence feed for accurate prioritisation and fast migration
By Skybox Security | 10/7/2017

To deploy resources in the right place, in the right way, vulnerability management teams need to know the intersection of vulnerabilities, network context and the threat landscape.

Download this now

IDC Infobrief: Unleash Business Agility on Cloud
By Lenovo | 1/8/2017

Cloud is now a vital enterprise digital platform of choice to achieve agility. This IDC InfoBrief throws the spotlight on the latest developments and the key factors for consideration to ensure cloud success.

Download this now

Advancing your anti-phishing program: How to be successful against email-borne attacks
By Mimecast | 18/8/2017

There appears to be no end in sight to the reign of phishing as the cyber attacker's number one threat delivery and communication vehicle. No surprise that the Verizon DBR 2017 report dubbed email as the "cyber spy's favored way in". Whether it's a script kiddie just goofing around, a member of one of the world's most sophisticated nation-state-based attacker groups trying to impact global politics, or a cybercriminal focused on turning digital information into digital cash, they all use email in their attack repertoire.

Download this now

2017 Vulnerability Management Survey Infographic
By Rapid7 | 2/6/2017

Cloud Security and Staff Security Training are the 2 biggest challenges facing Australian organisations in 2017, according to the CSO and Rapid 7 Vulnerability Management Survey.

Download this now

The hunt for IOT | The networks building deathstar-sized botnets from IOT minions
By F5Labs | 19/7/2017

For over a year now, F5 Labs and our data partner, Loryka, have been monitoring the ongoing hunt by attackers to find vulnerable IoT devices they can compromise. In our first report, DDoS’s Newest Minions: IoT Devices, our research proved what many security experts had long suspected: IoT devices were highly vulnerable to exploit, the level of interest in exploiting them was high, and distributed denial-of-service (DDoS) attacks using these devices were already occurring. Our findings and conclusions in Volume 11 rang true, and the new numbers show even steeper growth than we had imagined.

Download this now