Shop

  • Cognitions of a Cybercriminal: Introducing the Cognitive Attack Loop and the 3 Phases of Cybercriminal Behavior

    Free

    Carbon Black has released a ground-breaking white paper that proposes an updated cybersecurity kill chain model to help defenders stay ahead of evolving cyberattacks.
  • Exposed and Unprotected in Cloud Environments

    Free

    How risky is the cloud? We wanted to know so we asked our security researchers to set up a typical cloud environment with a honeypot included to log attacks. The hundreds of attacks within a few minutes of going live shocked even our veteran researchers.
  • Menlo Security Isolation Platform – Adaptive Clientless Rendering

    Free

    Browser isolation promises to safeguard users from future zero-day threats by running active content away from the endpoint.
  • A Taxonomic Approach to Understanding Emerging Blockchain Identity Management Systems

    Free

    Overview of the standards, building blocks, and system architectures that support emerging blockchain-based identity management systems and selective disclosure mechanisms.
  • Drone Automation In Security & Surveillance

    Free

    FlytBase, Inc. has released a white paper highlighting the factors critical to large-sale deployment of autonomous drones for security and surveillance applications.
  • The Advanced Analytics of Security Entrances

    Boon Edam Inc., has published a whitepaper for security professionals. Titled ‘The Advanced Analytics of Security Entrances’, the whitepaper provides information and guidance about the data that can be extracted from security entrances.
  • Public Safety prioritisation on commercial networks

    Free

    New white paper from TCCA’s Broadband Industry Group looks at the status and challenges of implementing priority mechanisms for first responders.
  • An Application of Combinatorial Methods for Explainability in Artificial Intelligence and Machine Learning

    Free

    This short paper introduces an approach to producing explanations or justifications of decisions made in some artificial intelligence and machine learning (AI/ML) systems, using methods derived from those for fault location in combinatorial testing.
  • Emergency Services Communications: Secure Chorus Compliant Products interoperability with Mission-Critical Push-to-Talk Products

    Free

    In response to unplanned events, geopolitical crises, natural and man-made disasters, public safety organisations and other relevant stakeholders require reliable, secure and interoperable multimedia communication technologies to support their operational effectiveness and service delivery.
  • How to Build a Micro-Segmentation Strategy

    Free

    Micro-Segmentation and Your Security Strategy: Why micro-segmentation? The perimeter doesn’t stop all bad actors from making it inside data centers and cloud environments. Regardless of how many detection technologies organizations use, something is bound to get through – a new virus, phishing emails, or a bad actor working at a company.
  • How to secure your crown jewel applications

    Free

    Protecting an organization’s most valuable assets or crown jewels is essential to protecting the organization from adverse monetary, reputational, and business continuity impact.
  • The State of IT Complexity in Australia

    Free

    Ever increasing complexity is holding back digital transformation efforts and restricting cloud adoption. Reducing complexity and increasing security is high on the agenda for CIOs and businesses in Australia.