This report reveals that there’s a concerning lack of understanding of the Shared Responsibility Model, a key requirement of most IaaS providers, which states that cloud customers must provide much of the security themselves. This needs to change if organisations are to create the secure foundation on which public cloud success and business growth must […]
Reconciling the discrepancy between real world buyer needs and mainstream firewall industry offering. Or how to build your own secure application delivery network.
The growth of cloud computing and the explosion of mobile devices are forcing dramatic changes in the way that networks are designed, conceived, and secured. Content security in particular faces novel challenges, as mobility and Web 2.0 applications make web traffic volumes highly unpredictable, with massive spikes and troughs from one moment to the next. […]
Barracuda Advanced Threat Protection (BATP) is a cloud-based service that provides in-depth defense against ransomware, malware, and advanced cyber attacks. It consists of multiple layers of detection, including signature, static, behavioral analysis—all the way to comprehensive sandboxing to provide accurate detection of a variety of polymorphic attacks. This cloud-based service has been integrated with all […]
No one is safe from ransomware, phishing, and advanced persistent threats. The cost of a successful attack is not just financial–your brand and professional reputations can also be damaged beyond repair. Download this whitepaper to discover Barracuda’s top 10 tips for reducing the risk of attack.
CISOs Investigate: User Behaviour Analytics (UBA) includes interviews with 11 security leaders who have deployed or are looking to deploy third-party solutions. This report replaces the ad hoc, often informal and time-consuming processes of personally gathering peer insight. The report includes responses to Requests for Information (RFIs) submitted by eight vendors. Developed by CISOs, the […]
The purpose of this white paper is to show you how you can successfully build a SOC, even with limited resources. The paper first explains the basics of the Cyber Attack Lifecycle and the need to address it through the Threat Lifecycle Management framework. Next, the paper explains the basics of SOCs, providing details of […]
As members of the security community, we’re already painfully aware of the sharp increase in major data breaches from glancing at the headlines, getting requests from management to explain the latest security issue, or even receiving notices that our own personal data has been compromised. We don’t need to be told that This book is […]
The external threat is one of the most high-profile risks that organisations face. Representing more than 80 percent of attacks today, external attackers look to take advantage of network and user weaknesses via malware, phishing, and advanced persistent threats (APT). Look in this paper for insights from LogRhythm and examples of how to best use […]
There are those who think data modeling is passé or irrelevant. After all, data modeling theory is more than 30 years old and some data modeling tools have been around for 20 years. But data modeling is still essential. In fact, it may be more necessary now than ever. This whitepaper looks at several key […]