"ERCIM White paper on Cyber-security and privacy research"

This document describes the main research challenges on security and privacy identified by a group of experts of the European Research Consortium in Informatics and Mathematics (ERCIM).In early 2014, ERCIM launched an initiative to identify the emerging of grand challenges in ICT and define the strategic research topics needed in order to achieve the highest impact results to meet those challenges.

Spotlight

CDW

In every organization, there are people who get technology. And people who don't. This is where CDW comes in. CDW is a leading provider of technology solutions for business, government, education and healthcare in the US and Canada. We're a 6,000-plus-member team.

OTHER WHITEPAPERS
news image

IDC Analyst Connection: DDoS: What You Don't Know Will Hurt You

whitePaper |

Distributed-denial-of-service (DDoS) attacks promise to remain a potent threat to the enterprise in 2015. Both IT and the boardroom need to protect mission-critical infrastructure from this growing menace to availability, brand image, and the bottom line. The key to success? Don't ignore DDoS; instead, take preventive action. With that in mind, IDC believes that hybrid defense scenarios (on-premises equipment married with cloud services) will continue to grow as organizations seek to parry advanced application and large-scale volumetric attacks and as solution providers and product vendors work to deliver joint solutions.

Read More
news image

Cloud Data Protection? Ask The Tough Questions.

whitePaper |

Lots of marketing claims are being made by Cloud Data Protection Gateway providers. It's time for critical analysis. This Blue Coat paper reviews the key questions Security, Governance & Risk and IT should be asking vendors.

Read More
news image

Are You Ready to Respond?

whitePaper |

In spite of the best efforts of the cyber security industry to protect computer networks, breaches still happen, causing millions of dollars in damage, tainting the reputation of corporations, and causing end users to lose confidence in the security of their personal information. Given that new reality, it's not enough for organizations to try to protect their networks from a reach, but to have an effective response plan in place for when a breach occurs anyway. Today, companies need to conduct a comprehensive response readiness assessment that lays out what steps to take in the event of a breach in order to minimize the damage and recover from the intrusion as quickly as possible.

Read More
news image

A Look at Deception

whitePaper | October 15, 2019

By 2021, cyber attacks are expected to cause $6 trillion in damages worldwide. To combat, spending is predicted to hit $1 trillion between 2017 and 2021. Attackers benefit from an infinite amount of time and tactics at their disposal, as they work to get around the typical static network and endpoint defenses organizations put in place. Deception can complement endpoint and network defenses, adding dynamic security mechanisms that can be customized for every environment to take the attacker’s advantage away.

Read More
news image

VULNERABILITY ASSESSMENT & PENETRATION TESTING

whitePaper | July 10, 2018

DETERMINE YOUR IT RISK EXPOSURE AND THE EFFECTIVENESS OF YOUR SECURITY CONTROLS. Nclose provides you with reassurance and facilitates regulatory compliance by delivering a comprehensive list of vulnerability assessment and penetration testing services. Regular assessment of your system’s vulnerabilities and testing of its security controls will reveal how vulnerable your infrastructure is from an attacker’s perspective. Depending on your organisation’s requirements, these services can be customised for specific scenarios, such as API and web applications, hosted infrastructure, internal LANs, and any other specific environment in which uptime is critical or where a compromise could place sensitive data at risk.

Read More
news image

The Importance of Cybersecurity Monitoring for Utilities

whitePaper |

Cybersecurity monitoring has become a key element in the layered security architecture of most enterprise-class networks. It can be used to provide 24 x 7 monitoring of both internal and perimeter networks, detecting and alerting on a range of potential cyber threats. Most cybersecurity monitoring solutions also include reports about the threats detected but there is a wide variance on the level of analysis and distilling of the data reported which in translates to a wide range of real value provided to customers.

Read More

Spotlight

CDW

In every organization, there are people who get technology. And people who don't. This is where CDW comes in. CDW is a leading provider of technology solutions for business, government, education and healthcare in the US and Canada. We're a 6,000-plus-member team.

Events