Global Threat Trends – January 2013

See a summary of the top ten threats and their detection rates.  Plus a feature article from ESET Senior Research Fellow, David Harley entitled “Fact, Fiction and Old-Time Movies”, In a world where nothing seems to be constant but change, it’s good to know that there are, in fact, some things that change fairly slowly. Unfortunately, readiness to believe and spread hoaxes is one of them.

Spotlight

Norman Shark

Norman Shark is a global leader in malware analysis solutions for enterprises, service providers and government, offering customers superior threat intelligence for building defensible networks. Blue Coat Systems, Inc., the market leader in business assurance technology, acquired Norman Shark in January, uniting the industry’s most proven zero-day sandboxing technology with Blue Coat’s leading Advanced Threat Protection solution to help customers bridge the gap between detection and resolution of advanced persistent threats.

OTHER WHITEPAPERS
news image

Cybersecurity Technologies for Cloud Access

whitePaper | September 14, 2022

The enterprises’ network and network security architectures are unable to effectively serve the dynamic secure access requirements of digital business. The enterprise data center is no longer the center of access requirements for users and devices.

Read More
news image

Fortinet Security Fabric Enables Digital Innovation

whitePaper | February 5, 2020

Organizations are rapidly adopting digital innovation (DI) initiatives to accelerate their businesses, reduce costs, improve efficiency, and provide better customer experiences. Common initiatives involve moving applications and workflows to the cloud, deploying Internet-of-Things (IoT) devices on the corporate network, and expanding the organization’s footprint to new branch locations. With this evolving infrastructure also come security risks. Organizations must cope with growing attack surfaces, advanced threats, increased infrastructure complexity, and an expanding regulatory landscape. To accomplish their desired DI outcomes while effectively managing risks and minimizing complexities, organizations need to adopt a cybersecurity platform that provides visibility across their environment and a means to manage both security and network operations easily.

Read More
news image

Asana Security and Privacy

whitePaper | October 26, 2022

Customers trust Asana with their data so that they can focus on the work that matters most to their businesses. That’s why we’re focused not only on creating an easy to-use collaborative work management solution, but also on keeping our customers’ data safe.

Read More
news image

Navigating the Changing Cyber Landscape in Australia

whitePaper | April 13, 2023

Those high profile data breaches led to a swift response from the Government with the penalties for serious or repeated privacy breaches increased from $2.22 million to a minimum of $50 million at the end of December. Since then, the Government has released the Privacy Act Review Report and the 2023-2030 Australian Cyber Security Strategy that signpost a significant shift for Australia’s cyber landscape. Critical infrastructure; personal information; cyber security; dealing with ransomware attacks – all are likely to be shaken up.

Read More
news image

PROMOTING BETTER CYBERSECURITY

whitePaper | December 18, 2019

The Ohio Data Protection Act (“ODPA” or the Act), came into force on November 2, 2018.1 The Act seeks to improve cybersecurity among Ohio businesses. It does so by providing an affirmative defense against tort claims arising from a data breach to businesses that can demonstrate they have implemented a qualifying cybersecurity program that reasonably conforms to one of ten specified cybersecurity frameworks and met certain other safeguards specified in the Act.

Read More
news image

Cyber security considerations 2022

whitePaper | September 12, 2022

The threat landscape is expanding. Cybercriminals are as entrepreneurial as ever and using increasingly sophisticated tools and technologies. In this fluid environment, we believe Chief Information Security Officers (CISOs) and their teams should adopt a mindset of enablement — cyber security is no longer just about prevention.

Read More

Spotlight

Norman Shark

Norman Shark is a global leader in malware analysis solutions for enterprises, service providers and government, offering customers superior threat intelligence for building defensible networks. Blue Coat Systems, Inc., the market leader in business assurance technology, acquired Norman Shark in January, uniting the industry’s most proven zero-day sandboxing technology with Blue Coat’s leading Advanced Threat Protection solution to help customers bridge the gap between detection and resolution of advanced persistent threats.

Events