White Papers: Security

Cyber security is an ever-moving target, particularly as the enterprise’s perimeter becomes more flexible in the mobile era and the threats evolve. Here we offer papers to help the IT security professional.

5 Arguments to Justify Your Identity Spend

Spending on secure infrastructure is vital to protect any company’s plans for revenue generation and business expansion, but all execs are faced with competing revenue-generating priorities across the business. When it comes to identity spend—which today make up less than 9% of the average security budget, despite its potential to prevent the 80% of data […]

Cyber AI & Darktrace Cloud

Secures new computing models, applications, users, and devices As organizations increasingly rely on cloud services and SaaS applications to streamline  business practices, the familiar paradigm of the network perimeter has dissolved, leaving a porous and ever-changing digital estate in its wake. While the benefits of cloud computing will ensure that migration continues apace, the unique […]

Cloud Threat Report 2019

This report summarizes 11 case studies of cloud-based attacks identified by cyber AI,  including spear phishing, insider threat, and zero-day malware. These case studies  demonstrate how weak indicators of malicious activity were only detectable using  Darktrace AI, a cloud-native solution that detects and responds to advanced cyber-threats in hybrid and multi-cloud environments.

Key Methods for Managing Complex Database Environments

As database infrastructures become more complex, you must adapt and learn to balance key business metrics, understand new technology challenges and find the right tools to  monitor and manage your database environment. This white paper describes key methods to successfully manage your complex database envrionment. A slow relational database can substantially impact the performance of […]

An Introduction to Advanced Malware and How it Avoids Detection

Despite millions being spent on security products, organizations are still suffering from advanced malware attacks and data breaches. Attacks continue to succeed because the malware has been engineered to detect and evade “advanced” or “next-generation” tools like firewalls, sandboxes, and IPS. Organizations interested in safeguarding their data need to understand how evasive malware behaves and […]

Mitigating Business Risk and Driving Business Value with Behaviour-Based AI Security

Artificial intelligence (AI) has emerged as a prominent technology in cybersecurity applications. This IDC Vendor Spotlight examines the advances in and recent uses of AI in cybersecurity as well as the role of Lastline in this important market.  The report offers an evaluation of AI-powered security capabilities that is required to understand what the technology […]

Protecting GPS Systems Against Spoofing and Jamming Threats

Critical infrastructure sectors such as wireline and wireless net­works, power grids, data centers and emergency services are now highly dependent on PNT information delivered by GPS. This brochures describes how Microsemi’s BlueSky GNSS Firewall solves the problem of protecting already deployed systems by providing a cost-effective overlay solution installed between existing GPS antennas and GPS […]

GNSS Security for PNT Applications

To guide operators of Critical Infrastructure sectors such as communications, energy, transportation, emergency services, financial services, and cloud data centers, the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) have described a number of steps that can be taken to mitigate outages and disruptions with GPS reception, thus improving its PNT (position, navigation, […]

Prioritization to Prediction Measuring What Matters

What matters in vulnerability management (VM)? What enables some programs to achieve higher levels of performance and greater success than others? Is it what they say (e.g., policies) or the products and tools with which they play? Does everything hinge on what they do or how they do it? Is it all about what they […]

Go Beyond Application Vulnerability Correlation

What It Takes to Move to Risk-Based Application. Vulnerability Management In the current application software development life cycle, using more than one  application security testing tool is a necessity, due to their different strengths and  weaknesses. Gartner sums up the need for multiple testing tools extremely well when it says, “Some vulnerabilities can be found […]