White Papers: Security

Cyber security is an ever-moving target, particularly as the enterprise’s perimeter becomes more flexible in the mobile era and the threats evolve. Here we offer papers to help the IT security professional.

Cyber AI & Darktrace Cloud

Secures new computing models, applications, users, and devices As organizations increasingly rely on cloud services and SaaS applications to streamline  business practices, the familiar paradigm of the network perimeter has dissolved, leaving a porous and ever-changing digital estate in its wake. While the benefits of cloud computing will ensure that migration continues apace, the unique […]

Cloud Threat Report 2019

This report summarizes 11 case studies of cloud-based attacks identified by cyber AI,  including spear phishing, insider threat, and zero-day malware. These case studies  demonstrate how weak indicators of malicious activity were only detectable using  Darktrace AI, a cloud-native solution that detects and responds to advanced cyber-threats in hybrid and multi-cloud environments.

Using Coverage and Efficiency to Determine Remediation Strategy Effectiveness

Is Your Remediation Strategy Working For You? Deciding which vulnerabilities to remediate is a daunting task. In a perfect world, all vulnerabilities would be remediated as discovered. But unfortunately, that doesn’t happen in the real world. Reality necessitates prioritization, but how can we measure the quality of prioritization? There are a number of remediation strategies […]

Prioritization to Prediction: Measuring What Matters

Kenna Security in partnership with the Cyentia Institute has recently launched its rioritization to Prediction Report, Volume 4: Measuring What Matters in remediation. In collaboration with the Cyentia Institute, this research takes a look at qualitative survey data on vulnerability management practices with quantitative measures of actual remediation performance to reveal what contributes to high-performing […]

5 Arguments to Justify Your Identity Spend

Spending on secure infrastructure is vital to protect any company’s plans for revenue generation and business expansion, but all execs are faced with competing revenue-generating priorities across the business. When it comes to identity spend—which today make up less than 9% of the average security budget, despite its potential to prevent the 80% of data […]

Key Methods for Managing Complex Database Environments

As database infrastructures become more complex, you must adapt and learn to balance key business metrics, understand new technology challenges and find the right tools to  monitor and manage your database environment. This white paper describes key methods to successfully manage your complex database envrionment. A slow relational database can substantially impact the performance of […]

An Introduction to Advanced Malware and How it Avoids Detection

Despite millions being spent on security products, organizations are still suffering from advanced malware attacks and data breaches. Attacks continue to succeed because the malware has been engineered to detect and evade “advanced” or “next-generation” tools like firewalls, sandboxes, and IPS. Organizations interested in safeguarding their data need to understand how evasive malware behaves and […]

Mitigating Business Risk and Driving Business Value with Behaviour-Based AI Security

Artificial intelligence (AI) has emerged as a prominent technology in cybersecurity applications. This IDC Vendor Spotlight examines the advances in and recent uses of AI in cybersecurity as well as the role of Lastline in this important market.  The report offers an evaluation of AI-powered security capabilities that is required to understand what the technology […]

Protecting GPS Systems Against Spoofing and Jamming Threats

Critical infrastructure sectors such as wireline and wireless net­works, power grids, data centers and emergency services are now highly dependent on PNT information delivered by GPS. This brochures describes how Microsemi’s BlueSky GNSS Firewall solves the problem of protecting already deployed systems by providing a cost-effective overlay solution installed between existing GPS antennas and GPS […]

GNSS Security for PNT Applications

To guide operators of Critical Infrastructure sectors such as communications, energy, transportation, emergency services, financial services, and cloud data centers, the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) have described a number of steps that can be taken to mitigate outages and disruptions with GPS reception, thus improving its PNT (position, navigation, […]