THREAT INTELLIGENCE AND ANALYSIS

May 9, 2019

Threat Intelligence and Analysis Bromium Secure Platform provides unique insights into threats that bypass traditional detection-based enterprise security solutions. Bromium-protected endpoints are not impacted by these threats that typically arrive as email attachments, downloaded files or links that direct the user to a malicious site. Bromium isolates malware inside a virtual machine before it has a chance to infect the PC or move laterally onto the corporate network.

Spotlight

NTA Monitor

NTA Monitor is a leading international IT security specialist with offices in the UK and Malaysia. NTA Monitor was founded in 1997, and has over sixteen years experience of providing a range of IT security testing, auditing and consultancy services. Our client base includes some of the world’s high profile companies, and large government organisations. We work with clients from all sectors including government, financial, manufacturing, legal, retail and IT services. NTA Monitor was a founder member of the CESG CHECK and CREST schemes, and has continually held the highest “green light” status since the start of the scheme in 1998. We are also a PCI ASV scanning vendor, and deliver services through the NPIA and OGC frameworks.

OTHER WHITEPAPERS
news image

Best Practices for Common Cybersecurity Threats

whitePaper | November 28, 2022

The threat of Criminal cyber activity continues to grow for organizations around the world, targeting everyone from select individuals to leading corporations and federal governments.

Read More
news image

Proven Ways to Prevent Ransomware Attacks

whitePaper | September 22, 2022

Ransomware is one of the fastest-growing and most costly cyber threats. According to a recent Perimeter 81 survey of over 500 IT professionals, 76% of respondents reported that their company experienced an attack within their organization.

Read More
news image

The Ethics and Security of Cloud Computing

whitePaper | October 17, 2022

Nearly four thousand years ago, Hammurabi engraved the laws of Babylon onto a stone plinth and revolutionized the codication of law. Today, lawyers of all walks of life are engaged in a new revolution, with the ability to practice law armed with nothing more than a tablet device and an internet browser—a revolution brought about, in large part, by the rise of cloud computing.

Read More
news image

Cyber Security: Defending your digital business

whitePaper | November 13, 2019

Your business relies on its technology – but lurking around the corner are intruders who can disrupt or devalue your operations. This report shines a light on the sources of the problem, and how you can establish the control you need to get the best from IT. In every corner of the globe, businesses are building new capabilities thatrely on technology. Small businesses are automating previously‐manual processes and digitizing key tasks and information sources. At the same time, large enterprises are dedicating vast resources to analytics and to digital transformation – capitalizing on the reach and opportunities enabled by digitalized processes.

Read More
news image

Security Protocol and Data Model (SPDM) Architecture White Paper

whitePaper | September 26, 2022

This white paper presents an overview of the SPDM architecture, its goals, and a high-level summary of its use within a larger solution. The intended target audience for this white paper includes readers interested in understanding the use of SPDM to facilitate security of the communications among components of platform management subsystems.

Read More
news image

DeltaV SIS™ and Cybersecurity

whitePaper | November 28, 2019

Safety Instrumented Systems (SIS) are designed to keep processes safe, especially during critical situations. With this concept in mind, it is paramount that the SIS components are not taken down due to cyber-threats. The purpose of this white paper is to explain, in detail, the Emerson approach for cybersecurity as well as the built-in security features available within the DeltaV SIS process safety system.

Read More

Spotlight

NTA Monitor

NTA Monitor is a leading international IT security specialist with offices in the UK and Malaysia. NTA Monitor was founded in 1997, and has over sixteen years experience of providing a range of IT security testing, auditing and consultancy services. Our client base includes some of the world’s high profile companies, and large government organisations. We work with clients from all sectors including government, financial, manufacturing, legal, retail and IT services. NTA Monitor was a founder member of the CESG CHECK and CREST schemes, and has continually held the highest “green light” status since the start of the scheme in 1998. We are also a PCI ASV scanning vendor, and deliver services through the NPIA and OGC frameworks.

Events