Shop

  • The Inevitable Costs of Status Quo Security

    Free

    This paper quantifies:
    1. The average global cost of a breach
    2. The costs associated with regulatory non-compliance
    3. The costs of status quo security to your organization
  • The Global Rise of Digital Goods and Services

    Free

    New study found that nearly three quarters (74%) of online purchases worldwide are for digital goods and services.
  • Bridging the Digital Risk Gap: How Collaboration Between IT and Risk Management Can Enhance Value Creation

    Free

    IT and risk management professionals must speak the same language to more effectively incorporate the benefits and uncertainties associated with data and technology into the organisations’ overall strategy and to add value.
  • Zero Trust Internet Is the Answer for 100% Email and Web Security

    Free

    Zero Trust Internet is a default deny approach that is fundamentally different from the way cybersecurity products work.
  • Business Case for Internet Isolation

    Free

    The Menlo Security Internet Isolation Gateway helps eliminate the hidden high costs of detection-only cybersecurity approaches.
  • Decoupling Security from the Network: The Evolution of Segmentation

    Free

    Goals of this white paper:
    • Explain the evolution of networks, SDN and host-based “security segmentation”
    • Describe core competencies and trade-offs of segmenting on each
    • Build a case for decoupling security from the network based on design logic and efficacy
  • Cognitions of a Cybercriminal: Introducing the Cognitive Attack Loop and the 3 Phases of Cybercriminal Behavior

    Free

    Carbon Black has released a ground-breaking white paper that proposes an updated cybersecurity kill chain model to help defenders stay ahead of evolving cyberattacks.
  • Exposed and Unprotected in Cloud Environments

    Free

    How risky is the cloud? We wanted to know so we asked our security researchers to set up a typical cloud environment with a honeypot included to log attacks. The hundreds of attacks within a few minutes of going live shocked even our veteran researchers.
  • Menlo Security Isolation Platform – Adaptive Clientless Rendering

    Free

    Browser isolation promises to safeguard users from future zero-day threats by running active content away from the endpoint.
  • A Taxonomic Approach to Understanding Emerging Blockchain Identity Management Systems

    Free

    Overview of the standards, building blocks, and system architectures that support emerging blockchain-based identity management systems and selective disclosure mechanisms.
  • Drone Automation In Security & Surveillance

    Free

    FlytBase, Inc. has released a white paper highlighting the factors critical to large-sale deployment of autonomous drones for security and surveillance applications.
  • The Advanced Analytics of Security Entrances

    Boon Edam Inc., has published a whitepaper for security professionals. Titled ‘The Advanced Analytics of Security Entrances’, the whitepaper provides information and guidance about the data that can be extracted from security entrances.