Data Security, Software Security

X-Force Threat Intelligence Index 2022

September 12, 2022

X-Force Threat Intelligence Index 2022
The world continues to grapple with a lasting pandemic, shifts to work-from-home and back-to-office, and geopolitical changes spawning a constant drone of mistrust. All of this equates to chaos, and it is in chaos that cybercriminals thrive.

Spotlight

Sig fox

It has been said before: less is more. SIGFOX demonstrates that truism with our network for the Internet of Things. A very big majority of those things will send and receive only small messages, e.g. position, orientation, temperature, inventory data, movement and battery status. Our global network is dedicated to providing long-range, low-throughput, cost-effective and energy-efficient connectivity that is perfectly suited for such two-way communication. It therefore eliminates the cost and energy-use barriers to wide adoption of the IoT and greatly extends the battery and service life of connected devices. Our network is established in France, Spain, the Netherlands and the U.K., and several European cities through the SIGFOX Network Operator program. We expect to roll it out soon in several more European countries and in North America and Asia Pacific, and go worldwide following that.

OTHER WHITEPAPERS
news image

Symantec White Paper - The Cyber Resilience Blueprint: A New Perspective on Security

whitePaper | January 2, 2020

In this sophisticated threat environment, traditional security tactics are failing. Symantec encourages organizations to revisit their security posture to build a more cyber resilient enterprise. Resilience is not defined by a series of checklists, but through evaluations based on the current threat environment and the acceptable risk level for the organization.

Read More
news image

Log More to Improve Visibility and Enhance Security

whitePaper | September 29, 2022

As the amount of system log data grows exponentially, security teams and threat hunters routinely must limit how much they can collect and how long they can store it because of the performance limitations and costs associated with traditional log management tools.

Read More
news image

GE Gas Power Cybersecurity Portal

whitePaper | October 31, 2022

GE Gas Power has developed a product security program based on industry-leading standards, encompassing end-toend cybersecurity through the entire software development lifecycle in conjunction with engineering, sourcing, and vulnerability and incident response. As part of this program, we have also created the Gas Power Cybersecurity Portal, a central, publicly available resource regarding cybersecurity at GE Gas Power.

Read More
news image

Cloud Security Survey 2023: Infrastructure Protection Best Practices

whitePaper | September 23, 2022

This survey was distributed by VMware User Group (VMUG) to their user base between July and September 2022. The responses were analyzed by the phoenixNAP team and key findings are presented in this document.

Read More
news image

The EU Cybersecurity Certification Scheme

whitePaper | September 28, 2022

GlobalPlatform is a technical standards organization that enables the efficient launch and management of innovative, secure-by-design digital services and devices, which deliver end-to-end security, privacy, simplicity, and convenience to users. It achieves this by providing standardized technologies and certifications that empower technology and service providers to develop, certify, deploy, and manage digital services and devices in line with their business, security, regulatory, and data protection needs.

Read More
news image

Cyber Risk Appetite: Defining and Understanding Risk in the Modern Enterprise

whitePaper | January 16, 2020

Managing risk is a balancing act for organizations of all sizes and disciplines. While some organizations take on too much risk, others arguably do not take on enough. Complicating this equation is the emergence of cyber as one of the most impactful sources of risk in the modern enterprise. In fact, cyber security is now increasingly reviewed by corporate boards of directors and often discussed with financial analysts who see cyber security risk as an imminent and paramount business risk. Because the consequences of cyber security failures can be damaging to business revenues and brand reputation, CEOs have lost their positions as a result of data breaches and inept preparation and planning.

Read More

Spotlight

Sig fox

It has been said before: less is more. SIGFOX demonstrates that truism with our network for the Internet of Things. A very big majority of those things will send and receive only small messages, e.g. position, orientation, temperature, inventory data, movement and battery status. Our global network is dedicated to providing long-range, low-throughput, cost-effective and energy-efficient connectivity that is perfectly suited for such two-way communication. It therefore eliminates the cost and energy-use barriers to wide adoption of the IoT and greatly extends the battery and service life of connected devices. Our network is established in France, Spain, the Netherlands and the U.K., and several European cities through the SIGFOX Network Operator program. We expect to roll it out soon in several more European countries and in North America and Asia Pacific, and go worldwide following that.

Events