Whitepaper | Security
WatchGuard

This guide, developed by The Channel Company, is designed to provide practical guidance that may be used to build or grow a managed security services practice. The playbook includes a high-level look...

Read MorePublished: 19/09/2019
Whitepaper | Security
OneSpan

Aite Group predict that by 2020, over 45% of checking and savings account applications will be submitted through online and mobile channels.

This white paper discusses best practices for...

Read MorePublished: 19/09/2019
Whitepaper | Security
OneSpan

As the use of mobile devices grows, the mobile channel is becoming an increasingly attractive target for malicious actors. But financial institutions and other organizations can take action to combat...

Read MorePublished: 19/09/2019
Whitepaper | Security
OneSpan

Behavioral biometrics is one of the most disruptive technologies in biometric authentication. It analyzes the way an individual interacts with their device – the angle at which they hold their phone,...

Read MorePublished: 19/09/2019
Event | Security
Forcepoint

Forcepoint is transforming cybersecurity by focusing on what matters most: people’s behaviour as they interact with critical data and systems.Digital transformation is a rapidly shifting...

Read MorePublished: 18/09/2019
Webinar | Security
Sophos

Threats are forever evolving, Melissa Virus caused over a $1 Billion in damage during 1999 then Locky Ransomware became just as destructive in 2016. Years ago the primary form of attacks was what we’d...

Read MorePublished: 18/09/2019
Whitepaper | Security
Thycotic

This report reveals key management issues facing those responsible for cyber security, including the need to address perceptions by senior leadership and employees.

Given the enormous impact of...

Read MorePublished: 17/09/2019
Whitepaper | Security
Thycotic

This free eBook, Cybersecurity for Dummies delivers a fast, easy read that describes what everyone needs to know to defend themselves and their organizations against cyber attacks – including simple...

Read MorePublished: 17/09/2019
Whitepaper | Security
Ixia

The agility and cost savings of cloud technologies continue to drive the digital economy. Cloud providers take care of security for the physical data centers and server hardware, but cloud users are...

Read MorePublished: 16/09/2019
Webinar | Security
Palo Alto Networks

SSL Decryption Deep Dive Webinar

3 Oct 2019 - 1:40PM SGT; 3:40PM AEST

Recent technology trends have led to a marked increase in the amount of TLS traffic, as it provides confidentiality and trust. However, this also presents an opportunity for attackers to hide...

Read MorePublished: 16/09/2019
Webinar | Security
Skybox Security

Knowing which vulnerabilities to remediate first is like finding the signal in the noise — and in enterprise systems, there’s plenty of noise. Making sense of which of the thousands (or millions) of...

Read MorePublished: 16/09/2019
Webinar | Security
F5

With close to 90% of the Internet encrypted and 68% of malware hiding in SSL/TLS web traffic, you may never see the threats lurking in your network. Many of the security inspection tools available...

Read MorePublished: 11/09/2019
Webinar | Security
BlackBerry

Wouldn’t it be nice if your security policies had the ability to relax when you are at the office or other trusted spaces, then snap to attention automatically if you are traveling to a higher-risk...

Read MorePublished: 11/09/2019
Event | Security
Palo Alto Networks

Cybersecurity landscapes continue to evolve rapidly on a global level. This can prove challenging for many organisations due to an increasing lack of security professionals, more sophisticated...

Read MorePublished: 10/09/2019
Event | Security
Palo Alto Networks

Palo Alto Networks Day 2019 | Osaka

3 Oct 2019 - Osaka, Japan

Secure the Enterprise. Secure the Cloud. Secure the Future.

Read MorePublished: 10/09/2019
Whitepaper | Security
Bitdefender

Bitdefender researchers recently found and analyzed a worm-cryptominer combo that uses a series of exploits to move laterally and compromise victims. What makes it interest is that it pauses the...

Read MorePublished: 10/09/2019
Whitepaper | Security
IBM

A global study conducted by Ponemon Institute for IBM Security shows 30% of respondents have insufficient cyber security staff for a high level of cyber resilience. Do you have enough security...

Read MorePublished: 09/09/2019
Event | Security
Trend Micro

XDR Workshop Series 2019 | Sydney

24 Sep 2019 - Sydney, Australia

The advanced threats of today, are designed to circumvent traditional cybersecurity defences and compromise sensitive corporate data. According to ESG*, 66% of organisations said that threat...

Read MorePublished: 09/09/2019
Event | Security
ESET

AVAR Cybersecurity Conference 2019 | Osaka

6 - 9 Nov 2019 - Osaka, Japan

The official agenda of Asia’s most prestigious cybersecurity conference is finally out! Check out the program of AVAR 2019 organized by ESET & packed with ground-breaking research presentations by...

Read MorePublished: 06/09/2019
Whitepaper | Security
Datacore

The threat alert from bad actors eager to steal confidential data seems constantly elevated. While headlines shine a spotlight on hackers breaking into live systems, another less publicized...

Read MorePublished: 06/09/2019
Show More..
Top
ITUpdate loading
Loading...