Managing the Cyber-Nuclear Nexus

July 24, 2019

Concern about cyber increasingly impacts all aspects of nuclear security, nuclear operations and nuclear thinking. The wide range of dynamics that fall under the cyber moniker are both changing and transforming the nature, capabilities and vulnerabilities of nuclear weapons, as well as the broader context within which security policy and warfare are conducted. This in turn has meant that states are wrestling with new issues of deterrence, arms control and stability as well as the safety, security and management of nuclear weapons and the future shape of the global nuclear order.

Spotlight

ThreatMark

ThreatMark offers fraud-prevention as a service for web and mobile applications. Their Cognitive Fraud-prevention Solution combines expert knowledge, hacker know how and machine learning to protect against phishing and malware, and to secures millions of users against account takeovers and payment fraud. Instead of identifying patterns in past attacks, ThreatMark focuses on authenticating genuine users in sensitive online environments, such e-commerce sites or online banking applications.

OTHER WHITEPAPERS
news image

ZTE Cybersecurity White Paper 2021

whitePaper | October 29, 2021

Telecommunications equipment and systems, as critical infrastructure for a nation, have been widely valued by governments, operators, and users worldwide. Currently, the deployment of 5G has begun. Featuring faster speed, greater network capacity, and ultra-low latency, 5G will redefine the operation of critical infrastructure from the factory floor to the cloud. Its new technologies including Software-Defined Networking (SDN), Network Function Virtualization (NFV), Multi-access Edge Computing (MEC), and network slicing are paving the way for smart cities, remote surgery, autonomous vehicles, and large-scale Internet of Things (IoT) connectivity.

Read More
news image

Best Practices for Row Level Security in Tableau with Entitlements Tables

whitePaper | January 18, 2023

Row Level Security (RLS) in Tableau refers to restricting the rows of data a certain user can see in a given workbook or data source at the time they view the data. It contrasts with permissions within Tableau Server (or Tableau Online), which are used to control access to content and feature functionality.

Read More
news image

Security Whitepaper 2023

whitePaper | July 18, 2023

Statype asks a lot from our customers: we ingest sensitive financial, performance, and customer information to generate deep insights. Our customers trust us to get this right because security is a core tenant of everything we build, and we prioritize getting security right

Read More
news image

The ‘Zero Trust’ Model in Cybersecurity: Towards understanding and deployment

whitePaper | August 24, 2022

In the last couple of years, “zero trust” has gained significant traction in the cybersecurity realm as a means to protect networks and increase security across organizations. In part, the growing popularity of this security model can be attributed to the shift to hybrid working practices that call for a more secure work environment whether on- or off-premises.

Read More
news image

Madcap Central Security Whitepaper

whitePaper | February 8, 2023

MadCap Central leverages the security, power, and flexibility of the cloud to mitigate or eliminate many of the technical hurdles faced by both content creators and information technology professionals. The overhead traditionally associated with managing complex systems can hinder the ability to create content and deliver content efficiently. The goal of this document is to provide a high-level overview of the ways that Central addresses these challenges.

Read More
news image

Fujitsu PRIMERGY Server Security Overview

whitePaper | May 22, 2023

During the last few years server security has become a key building block for end-to-end security. We see strongly increasing cyber-attacks on server infrastructure, which results in an intense need for server security. This whitepaper presents an overview of the security features which are available for PRIMERGY server.

Read More

Spotlight

ThreatMark

ThreatMark offers fraud-prevention as a service for web and mobile applications. Their Cognitive Fraud-prevention Solution combines expert knowledge, hacker know how and machine learning to protect against phishing and malware, and to secures millions of users against account takeovers and payment fraud. Instead of identifying patterns in past attacks, ThreatMark focuses on authenticating genuine users in sensitive online environments, such e-commerce sites or online banking applications.

Events