Bloxx_logo_for_web_and_email_useSocial Media Access At Work. Do Your Employees Know The Rules?download eBook

If they don´t, it´s time they did! It´s estimated that the negative impact of social networking is costing the UK economy around £132 million a day. Discover some of the most plausible and accepted explanations on this subject:

line

HexaditeFive Costly Data Breachesdownload eBook

Given their financial and reputational costs, it is instructive to analyze some of the most well-known data breaches in order to truly understand how destructive these incidents can be. Five separate data breaches are provided within this FREE ebook.

line

ad-sec-large-versionHow Hackers Are Using RATs To Infect Users With Easedownload eBook

A Remote Administration Tool, or RAT is a piece of software originally created for system administrators to monitor, or control a network of computers in order to ensure that everything on the network follows certain guidelines, to prevent users from using the machines maliciously.

line

Mandiant_LogoBeyond The Breachdownload eBook

Cyber security has gone mainstream. It is hard to overstate how quickly cyber security has gone from a niche IT issue to a consumer issue and boardroom priority. Everyone now knows what seasoned security professionals have long been aware of: there is no such thing as perfect security.

line

WebLife-Balance-LogoA New Approach to Managing Employees’ Personal Internet Use at Workdownload eBook

Despite corporate efforts to restrict employees from using the Internet for personal purposes, to lock down the enterprise, to monitor and control employee web browsing, cyber threats persist, and the growing tension the situation is creating between employers and employees is resulting in active civil disobedience against most employers’ Acceptable Use Policies.

line

The Roer Group5 Reasons Why We See Security Awareness Training Programs Faildownload eBook

This is a list of the most common reasons why we see security awareness training programs fail to create positive results. It was compiled after analyzing a number of organizations in Europe and the USA over the course of several years.

line

bugcrowd_logoFlex Bounty Program: Efficiency Reportdownload eBook

When it comes to vulnerabilities, organizations face a problem of scale. Even as the vulnerability discovery and management market grows, the amount of money to test for new and existing vulnerabilities is hardly skyrocketing. Meanwhile, Web-based malware attacks more than doubled in the second half of 2013, the global cost of cybercrime exceeded $400 billion in 2013 and there’s no sign of that pressure letting up

line

McAfeeThe Security Industry’s Dirty Little Secretdownload eBook

Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises.

line

Easy_solutions_logoMobile Banking Fraud Prevention Strategydownload eBook

As customers increasingly migrate to mobile devices as their preferred banking channel, cybercriminals will progressively come up with new and innovative ways to target mobile platforms and users. Financial institutions are now realizing mobile applications give them an advantage in winning new customers and retaining existing clients.

line

identropy_logoHow To Perform a SaaS Application Inventory in 5 Stepsdownload eBook

This book will help you, the person in the organization who cares deeply about security and compliance posture of the company, to regain some sanity amidst all of the SaaS chaos. Discover how to create a catalog of all your SaaS apps, assign a risk score, then create an action plan to address exposures.

line

VASCO_logoBenefits and Economics of 2-Factor Authentication Platformsdownload eBook

Hackers lurk everywhere on the Internet, intent on stealing user information and defrauding online merchants. Assuring customers that your website is a secure place to spend time, effort and money is the key benefit of implementing an authentication platform.

line

airwatch_by_VMwareBest Practices For A Productive BYOD Programdownload eBook

A Google Trends search for “BYOD” reveals it is a fairly new term, appearing in news publications for the first time in late 2011. BYOD is one part of a much larger, deeper-rooted trend: The consumerization of IT, which can be traced back to the early 2000s. Around that time, most everyone had a personal computer, which enabled them to work from home after hours

line
Easy_solutions_logoThe Value Of Total Fraud Protectiondownload eBook

Total Fraud Protection from Easy Solutions is more than a multi-channel and end-to-end approach to fraud protection, it is a vehicle for the delivery of sustainable innovation. In a constantly changing and complex fraud landscape its main advantages are simplicity and flexibility.

line

cropped-sensecy-logosloganWeb-Injection Service for the World´s Leading Banks on Sale on the Russian Undergrounddownload eBook

In the last year, we have been monitoring an ongoing discussion on one of the Russian underground forums. The first post was uploaded in March 2013 (this was not the first time that the seller advertised injection services – his activity in this area dates back to the end of 2011)

line

Infosec BuzzSimple Solutions To Get More Customersdownload eBook

Information Security Buzz offer a fantastic range of low cost marketing solutions with measurable results that ensure your investment can be justified. Download the ebook to find out more.

line

tempest logoThreat-Based Defence as a New Approach to Cyber Securitydownload eBook

An increasing number of organisations and individuals fall victim to cyber attacks, despite having set defence mechanisms. Most victims implement a rather traditional perimeter-based approach to cyber security, defending against known attacks with solutions like anti-virus and firewalls, increasingly ineffective against targeted attacks by persistent adversaries.

lineInterested in having your Whitepaper or Ebook hosted on Information Security Buzz? Get in touch via our contact page to find out how!