Global IT Security Risks Survey 2015: The Current State of Play

This year has seen another cavalcade of high profile cyber attacks making headlines. With them has come an increasing awareness among businesses that, along with the attacks that make waves in the press, there are a wide range of ‘quieter’ threats that are a danger to their operations. In particular, there’s a growing realization that in our hyper-connected world, it’s not just their own security that businesses should be concerned with. Consequently, the vulnerability of third parties – especially those connected to financial transactions – has risen up the agenda.

Spotlight

Shape Security

The world's leading banks, airlines, retailers, hotel chains, and federal agencies rely on Shape as their primary line of defense against sophisticated cybercrime. The Shape technology platform, covered by 50+ patents, stops automated fraud and other attacks on web and mobile applications, including credential stuffing, account takeover, scraping, and unauthorized aggregation. Shape is one of the largest processors of login traffic in the world and protects more than 1.3 billion user accounts. Shape prevented more than $1 billion in fraud losses last year. Shape was recognized in Fortune Magazine as one of the leading companies in artificial intelligence in 2018 and listed in CNBC's top 50 most disruptive companies in the world.

OTHER WHITEPAPERS
news image

Understanding Ransomware and Strategies to Defeat it

whitePaper | March 5, 2020

Held Hostage in Hollywood: In February 2016 the Hollywood Presbyterian Medical Center, in Los Angeles, paid a ransom of about US$17,000 to hackers who infiltrated and disabled its computer network with ransomware. The hospital paid the ransom of 40 Bitcoins (currently worth about $16,664) after a “network infiltration” began on February 5, when employees reported being unable to access the hospital’s network and electronic medical records system. “The malware locked access to certain computer systems and prevented us from sharing communications electronically,” said hospital CEO Allen Stefanek.

Read More
news image

2022 Cybersecurity Predictions

whitePaper | June 27, 2022

At the end of every year, our experts put their heads together to anticipate and prepare for what’s to come next in the world of cybersecurity. We retrospect on the months past, and analyze impactful developments, breaches, and tactics. We package the outputs of this process for IT leaders, so they, too, can anticipate and prepare.

Read More
news image

VIRSEC ® SECURITY PLATFORM

whitePaper | December 10, 2019

Advanced application attacks that weaponize at runtime (WRT) are increasingly putting businesses at risk. These attacks challenge application security by leveraging fileless malware, memory corruption and uncommon vulnerabilities to evade traditional security solutions. WRTs manipulate legitimate processes and enable stealthy execution of malicious code, resulting in data breaches, damaged infrastructure, and financial losses.

Read More
news image

5 Top Residential Security Trends to Watch in 2023

whitePaper | February 24, 2023

The security industry has gained millions of households due to the explosion of DIY offerings and COVID-19. Households sought stability and safety during COVID and were able to find low-cost solutions. In 2022 though, home security system adoption slowed with home security ownership dropping from 2021 levels. The industry’s top players, however, are achieving record revenue in 2022 and that shows no signs of slowing. The rebound of professional installation since 2020 and recent solar system and service offerings have generated robust revenue growth.

Read More
news image

Dell VxRail: Comprehensive Security by Design

whitePaper | September 29, 2022

In today’s world, business organizations and individuals have become accustomed to accessing the information they need 24 hours a day, seven days a week, often within seconds of making a request. To illustrate, an ad marketing study conducted by Google found that 53% of website sessions are terminated if pages take longer than three seconds to load.

Read More
news image

Network Traffic Analysis (NTA): A Cybersecurity ‘Quick Win’

whitePaper | February 27, 2020

According to research from ESG and the Information Systems Security Association (ISSA), 91% of cybersecurity professionals believe that most organizations are either extremely or somewhat vulnerable to a significant cyber-attack or data breach.1 This level of cyber-risk demands immediate attention and action from CISOs, CIOs, and business executives. As a result, 62% of organizations plan to increase cybersecurity spending in 2020.2 Here’s the problem: Increasing security budgets alone isn’t enough. CISOs need quick and easy wins that can greatly bolster security efficacy and streamline operations without demanding massive projects and vast resources. There is a lot of work ahead. This white paper concludes.

Read More

Spotlight

Shape Security

The world's leading banks, airlines, retailers, hotel chains, and federal agencies rely on Shape as their primary line of defense against sophisticated cybercrime. The Shape technology platform, covered by 50+ patents, stops automated fraud and other attacks on web and mobile applications, including credential stuffing, account takeover, scraping, and unauthorized aggregation. Shape is one of the largest processors of login traffic in the world and protects more than 1.3 billion user accounts. Shape prevented more than $1 billion in fraud losses last year. Shape was recognized in Fortune Magazine as one of the leading companies in artificial intelligence in 2018 and listed in CNBC's top 50 most disruptive companies in the world.

Events