Shop

  • Web Attacks and Gaming Abuse

    Free

    The report shares results from a 17-month analysis of Internet traffic in this criminally lucrative sector. The insights are valuable no matter what industry you’re in. You’ll learn:
    • How web attacks are evolving
    • The latest trends in credential abuse and gaming
    • 3 lessons about working with security teams
  • Consumer Differences Shape Alternative Payments and Cashless Systems Adoption

    Free

    The study surveyed more than 3,000 consumers in the United States, United Kingdom and Australia. It explores their attitudes toward making payments on wearables, mobile apps and cashless systems as well as the role of cash in the payments mix. The study illuminates differences in opinion across geographic location, age groups, and gender, and also highlights the anxiety consumers have about security.
  • Peak Human Potential: Preparing Australia’s workforce for the digital future

    Free

    Digital disruption of the workplace will compel a radical reinvention of how we educate and train workers for the future of work, according to a new report published by Swinburne’s Centre for the New Workforce.
  • Public Safety prioritisation on commercial networks

    Free

    New white paper from TCCA’s Broadband Industry Group looks at the status and challenges of implementing priority mechanisms for first responders.
  • Payment Preferences for Recurring Purchases: 2019 Consumer Payer Report

    Free

    GoCardless has launched research into global consumer payment preferences for recurring purchases. The research, conducted by YouGov, found Australian and New Zealand consumers still prefer to use Bank Debit to pay household bills and instalments.
  • Healthcare Cyber Heists in 2019

    Free

    Carbon Black (NASDAQ: CBLK) has released a seminal report on the state of cybersecurity in the healthcare industry, The report, Healthcare Cyber Heists in 2019, features direct input from 20 industry-leading CISOs to determine how attackers have evolved over the past year.
  • Privileged Access Threat Report

    Free

    The global survey explores the visibility, control, and management that IT organisations in the U.S., APAC, Europe and the Middle East have over employees, contractors, and third-party vendors with privileged access to their IT networks. According to the report, 64% of businesses globally believe they’ve likely had either a direct or indirect breach due to misused or abused employee access in the last 12 months, and 62% believe they’ve had a breach due to compromised vendor access.
  • Ninth Annual Cost of Cybercrime Study

    Free

    Cyberattacks are on the rise for Australian organisations, experiencing an 18% increase in the number of security breaches in 2018, according to new research published by Accenture and Ponemon Institute. The study shows Australian companies experienced an average of 65 security breaches in 2018, compared to an average of 53 in 2017.
  • Proofpoint Q1 2019 Threat Report

    Free

    Proofpoint has released its Q1 2019 Threat Report, highlighting the threats and trends across Proofpoint’s global customer base and in the wider threat landscape. Notably, Proofpoint found that 61 percent of malicious payloads observed in Q1 2019 were driven by the actor distributing the Emotet botnet.
  • The State of Email Security Report 2019

    Free

    The third-annual Mimecast State of Email Security report provides insights from 1,025 global IT decision makers. As cybercriminals continue to use email as a primary vehicle to steal data and deliver advanced threats, the results of this research provide valuable insights and trends around what’s affecting organisations the most and how they can improve their overall security posture.
  • Webinar – Where should SMBs spend their cybersecurity dollars?

    May 31, 2019

    Where should SMBs spend their cybersecurity dollars?
  • Bots down under

    Free

    Kasada has debuted Bots Down Under – An Australian Market Threat Report revealing 90% of the nation’s credential abuse attacks* are delivered from within Australia via local ISP networks.