Shop

  • The ESET Cyberawareness Index Australia 2019

    Free

    Survey of more than 1000 individuals in Australia reveals cybersecurity knowledge and best-practice behaviour leaves room for improvement.
  • Predictions 2020 – Looking forward to next year in cyber security

    Free

    Each year Huntsman Security provides its views and estimates on what the big topics, main drivers and pressing concerns will be in the cyber security and related fields for the coming year.
  • Five questions to ask when considering a DDoS managed service

    Free

    Read this whitepaper to explore the five questions you should ask to ensure your DDoS managed service provider can meet your security needs.
  • MEF 3.0 SD-WAN Services

    Free

    The whitepaper provides the definition of standardized managed SD-WAN services, use cases, service requirements and an overview of MEF’s SD-WAN initiatives.
  • The Inevitable Costs of Status Quo Security

    Free

    This paper quantifies:
    1. The average global cost of a breach
    2. The costs associated with regulatory non-compliance
    3. The costs of status quo security to your organization
  • The Global Rise of Digital Goods and Services

    Free

    New study found that nearly three quarters (74%) of online purchases worldwide are for digital goods and services.
  • Bridging the Digital Risk Gap: How Collaboration Between IT and Risk Management Can Enhance Value Creation

    Free

    IT and risk management professionals must speak the same language to more effectively incorporate the benefits and uncertainties associated with data and technology into the organisations’ overall strategy and to add value.
  • Zero Trust Internet Is the Answer for 100% Email and Web Security

    Free

    Zero Trust Internet is a default deny approach that is fundamentally different from the way cybersecurity products work.
  • Business Case for Internet Isolation

    Free

    The Menlo Security Internet Isolation Gateway helps eliminate the hidden high costs of detection-only cybersecurity approaches.
  • Decoupling Security from the Network: The Evolution of Segmentation

    Free

    Goals of this white paper:
    • Explain the evolution of networks, SDN and host-based “security segmentation”
    • Describe core competencies and trade-offs of segmenting on each
    • Build a case for decoupling security from the network based on design logic and efficacy
  • Cognitions of a Cybercriminal: Introducing the Cognitive Attack Loop and the 3 Phases of Cybercriminal Behavior

    Free

    Carbon Black has released a ground-breaking white paper that proposes an updated cybersecurity kill chain model to help defenders stay ahead of evolving cyberattacks.
  • Exposed and Unprotected in Cloud Environments

    Free

    How risky is the cloud? We wanted to know so we asked our security researchers to set up a typical cloud environment with a honeypot included to log attacks. The hundreds of attacks within a few minutes of going live shocked even our veteran researchers.