2015 Insider Threat Report: Retail Edition

Criminal hackers are the biggest threat to retailers. While retailers have increased spending to protect consumer data, there is still sensitive data being exposed. This report provides trends and future directions in data security that can help retail IT security make their tough decisions.

Spotlight

Libyan Roots

As the first integrated security services company in Libya, and with the vision to be the leading Information Security Provider in the region; Libyan Roots committed to helping businesses, governments, banking, IT/telecom and Oil/Gas companies plan, build and run successful security programs through an effective set of security services related to security program strategy, enterprise risk and consulting, threat and vulnerability management, and security architecture and implementation.

OTHER WHITEPAPERS
news image

Cyber Security for Business

whitePaper | December 17, 2019

At CGI, cyber security is part of everything we do. For more than 40 years, we have helped clients manage complex security challenges with a business focused approach – protecting what is most valuable to them. As our economy becomes even more digital in nature, securing our organisations against cyber-attacks and data breaches has become one of the most important business issues facing senior management.

Read More
news image

Supply Chain Security in MongoDB’s Software Development Lifecycle

whitePaper | May 25, 2022

Cybersecurity breaches do more than expose data to malicious actors. They generate headlines, captivate the public’s attention, and shine a light on security gaps. Whether it’s weak passwords or the software supply chain, if a vulnerability exists, cybercriminals will exploit it.

Read More
news image

Cyber Security in the AC500 PLC family

whitePaper | February 7, 2023

ABB offers a comprehensive range of scalable PLCs and robust HMI control panels. Since its launch in 2006, the AC500 PLC platform has achieved significant industry recognition for delivering high performance, quality and reliability. Cyber Security has become of key importance for ABB customers and ABB alike. In order to help protect ABB customers as well as our brand, cyber security must be an important aspect in our products, systems, projects and service deliveries.

Read More
news image

Aerospace cybersecuirty- Bringing a zero-trust approach to aviation product network design

whitePaper | May 18, 2022

Modern aerospace products are moving into containerization and micro-services. Mounting connected internal micro-services patterns in a product segregates and segments the network to support a zero-trust network security approach. Having weak internal network security of the product allows malicious actors to exploit them and elevate privileges — denying users access, jamming signals, or even shutting them down. Such interference could cause major harm to aircraft safety and operations.

Read More
news image

XDR vs. SIEM: A Cybersecurity Leader’s Guide

whitePaper | December 27, 2022

As threats intensify and SecOps teams are called upon to defend digital environments that keep growing in size and complexity, and with a defensible perimeter that has all but disappeared, cybersecurity vendors are responding with a new generation of software and service solutions.

Read More
news image

DeltaV SIS™ and Cybersecurity

whitePaper | November 28, 2019

Safety Instrumented Systems (SIS) are designed to keep processes safe, especially during critical situations. With this concept in mind, it is paramount that the SIS components are not taken down due to cyber-threats. The purpose of this white paper is to explain, in detail, the Emerson approach for cybersecurity as well as the built-in security features available within the DeltaV SIS process safety system.

Read More

Spotlight

Libyan Roots

As the first integrated security services company in Libya, and with the vision to be the leading Information Security Provider in the region; Libyan Roots committed to helping businesses, governments, banking, IT/telecom and Oil/Gas companies plan, build and run successful security programs through an effective set of security services related to security program strategy, enterprise risk and consulting, threat and vulnerability management, and security architecture and implementation.

Events