Security with Windows 10: Understanding and deploying Device Guard

According to a 2015 report by the Ponemon Institute, organisations receive almost 17,000 malware alerts in a typical week. Only 19% of these are deemed reliable, and of those 3,218 alerts, a more 705 are subsequently investigated. This suggests that organisations lack the resources and expertise to properly protect themselves.

An omniscient strategy is required. Such a strategy has long been considered tantamount to the 'holy grail' of endpoint security - but in this whitepaper from 1E, find out how Microsoft Device Guard makes this ideal close to a reality.

By 1E, 17 November 2017, 0 comments Categories: Microsoft, Security, Vulnerabilities

Keep EC2 instances secure through Intrusion Detection and Intrusion Prevention Systems

For AWS customers using the Shared Responsibility Model, organisations are responsible for the configuration that they implement to ensure their compute instances – and the assets within them – are secure.

This paper from Amazon Web Services examines how to detect vulnerabilities in your EC2 instances, protect them from attacks, and how to respond to intrusion or attacks against your EC2 instances.

By Amazon Web Services, 04 September 2017, 0 comments Categories: Amazon, Security

The CIO's strategy guide to securing the cloud

The move from server-based to service-based thinking is changing the way traditional IT departments design and deliver the technology that supports their businesses.

Yet there are obstacles standing in the way of blanket take up of the cloud. Integrating apps like Salesforce, Office 365, Dropbox and a whole raft of SaaS offerings with an on-premise network means the cloud blurs traditional corporate IT boundaries.

This whitepaper from CensorNet is a playbook for CIOs examining the risks you could come up against and pointers for managing security risks in the cloud.

By CensorNet, 22 June 2017, 0 comments Categories: CIO, Security

An enterprise security blind spot: Are cybercriminals hiding in your SSL traffic?

SSL traffic is pervasive in today’s enterprises and is expected to grow rapidly over the next several years; according to Gartner, SSL/TLS traffic now comprises 15% to 25% of total web traffic. The problem is the bad guys have noticed.

This report from Venafi examines how enterprises can eliminate the blind spots in SSL traffic, maximise the powers of decryption, and uncover threats.

By Venafi, 19 July 2016, 0 comments Categories: Enterprise, Privacy, Security

Rethinking cyber security: Where does accountability lie?

The many high profile data breaches we have seen splashed across the front pages highlight just how damaging a cyber attack can be on market position, reputation and profits, infiltrating customer data and critical IP. The frequency and success of these attacks also highlights that the existing security strategies of many organisations are dangerously flawed, leaving them wide open to threat, as VMware investigates in this whitepaper downlod.

By VMware, 24 June 2016, 0 comments Categories: Enterprise, Security

The tipping point: Why enterprise security must change

In today's digital world, data is the currency giving businesses the power to act decisively and swiftly, provide rich customer experiences and remain one step ahead of the competition. But as data becomes more valuable, it also becomes more vulnerable.

In this whitepaper, VMware gathered insights from 1,700 IT decision makers and 3,500 office workers from across EMEA and provide 10 important takeaways on the future of enterprise security.


By VMware, 24 June 2016, 0 comments Categories: Enterprise, Security

Six steps to effective vulnerability response

The number of vulnerabilities identified in servers, operations systems, applications, and databases has increased at an alarming rate in the past several years—and the outlook going forward is no better. Systems, networks, and applications will continue to be susceptible to vulnerabilities, so it is important to be prepared for response when a vulnerability is identified.

By Alert Logic, 13 May 2015, 0 comments Categories: Security, Vulnerabilities