The CISO's Guide to Spear Phishing Defense

"Spear phishing is the preferred attack method for advanced threat actors. Well-crafted spear phishing attacks easily slip past layers of defenses and target the only vulnerability that cannot be patched -- people. The vast majority of headline data breaches in recent years have all begun with spear phishing attacks."

Spotlight

QuintessenceLabs

"Founded in 2006, QuintessenceLabs addresses the most difficult security challenges facing companies, helping implement robust security strategies to protect data today and in the future. QuintessenceLabs products include: - an enterprise scale true random number generator delivering full entropy random at 1 Gbit / sec - a vendor neutral, centralized key and policy manager with fine grained policy management and logging and true random keys - one-time pad protection for recording and storage devices in uncontrolled environments"

OTHER WHITEPAPERS
news image

Cyber Security for Business

whitePaper | December 17, 2019

At CGI, cyber security is part of everything we do. For more than 40 years, we have helped clients manage complex security challenges with a business focused approach – protecting what is most valuable to them. As our economy becomes even more digital in nature, securing our organisations against cyber-attacks and data breaches has become one of the most important business issues facing senior management.

Read More
news image

Managed Security Services Platform for SOC

whitePaper | November 23, 2022

Managed Security Services (MSS) uses a combination of People, Process and Technology to deliver Intelligent SOC Capabilities. CyberRes MSS platform collects and correlates data from multiple enterprise log sources & specialized security toolsets along with integrated with custom Threat Intelligence, SOC Portal to provide comprehensive Threat Detection & Response capabilities plus better overall security outcomes.

Read More
news image

Security Pillar AWS Well-Architected Framework

whitePaper | October 18, 2022

Amazon's trademarks and trade dress may not be used in connection with any product or service that is not Amazon's, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by Amazon.

Read More
news image

2020 Cyber Security Predictions

whitePaper | January 28, 2020

This year there are some common themes that endure, so we’ll highlight these as “work in progress”. Transformations often take longer than 12 months to be identifi ed as necessary, to be executed and to become established. However, there are other themes emerging through a combination of drivers from audit, compliance security and governance that are now showing signs of infl uencing the way that cyber risks are managed in a much shorter timescale.

Read More
news image

Security, privacy, and compliance with Illumina Connected Analytics

whitePaper | August 23, 2022

Advances in next-generation sequencing (NGS) technologies have dramatically increased the amount of data generated, creating challenges in data analysis and interpretation. Illumina Connected Analytics (ICA) is a secure genomic data platform to operationalize informatics and drive scientific insights. ICA provides an extensible platform with a rich set of RESTful application program interfaces (APIs) and a command-line interface (CLI) tool to maximize workflow efficiency.

Read More
news image

CloudVision as-a-Service: Security and Data Protection

whitePaper | January 24, 2023

Cloud-based software delivery has increasingly become the norm in today’s world, owing to the elasticity, scalability, and economy of cloud architectures. Arista has established a leadership position in the delivery of reliable and secure cloud networking and services management through the introduction of CloudVision®, a single unified AI/ML-enabled network management platform supporting every place in the cloud – and CloudVision is now available in an “as-aService” delivery model in the cloud.

Read More

Spotlight

QuintessenceLabs

"Founded in 2006, QuintessenceLabs addresses the most difficult security challenges facing companies, helping implement robust security strategies to protect data today and in the future. QuintessenceLabs products include: - an enterprise scale true random number generator delivering full entropy random at 1 Gbit / sec - a vendor neutral, centralized key and policy manager with fine grained policy management and logging and true random keys - one-time pad protection for recording and storage devices in uncontrolled environments"

Events