CERT White Papers (View All Report Types)
The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012


Five Myths of Agile Development
sponsored by VersionOne Inc.
WHITE PAPER: In this white paper, you will gain insight into five myths commonly associated with agile development. Explore what agile development is in reality, what it is not, and the true benefits of transitioning to agile methods in your organization.
Posted: 15 Oct 2008 | Published: 26 Sep 2008

VersionOne Inc.

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012


Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011


A Hack Attack: Six Steps to Recovery
sponsored by Cisco Systems, Inc.
WHITE PAPER: It’s startling when malware hits your network, or an intruder enters by password cracking. You’ve been hacked—now what? Don’t panic. Read about the six steps that your business can take to respond and protect itself.
Posted: 21 Jan 2011 | Published: 21 Jan 2011

Cisco Systems, Inc.

Building A Production-Ready Zero-Trust Environment With Cert-Manager And Istio Service Mesh
sponsored by Venafi
EBOOK: Read this e-book to explore the key cloud native factors to consider when first embarking on a journey to adopting Istio, and how to align with modern zero-trust networking principles.
Posted: 01 Mar 2022 | Published: 02 Mar 2022


OT/IoT Security Report
sponsored by Nozomi Networks
RESOURCE: To help security teams and researchers of OT/IoT environments, this report focuses on three main areas: trends in attacks, vulnerability research, and best practices in remediation efforts and technology. Read on to learn more.
Posted: 14 Apr 2022 | Published: 15 Apr 2022

Nozomi Networks

Trends and Countermeasures for Critical Infrastructure Attacks
sponsored by Nozomi Networks
RESOURCE: To help security teams and researchers of OT/IoT environments, this report focuses on three main areas: trends in attacks, vulnerability research, and best practices in remediation efforts and technology. Read on to learn more.
Posted: 14 Apr 2022 | Published: 15 Apr 2022

Nozomi Networks

How Can Privileged Access Accounts Be Managed in Large Companies?
sponsored by One Identity
EGUIDE: According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
Posted: 20 Nov 2017 | Published: 13 Nov 2017

One Identity

Detect and Survive
sponsored by Guidance Software, Inc.
WHITE PAPER: This white paper discusses why the need to forensically examine security threats is an increasingly vital tool for modern companies. It also examines leading providers of this technology, including EnCase Cybersecurity from Guidance Software.
Posted: 16 Apr 2010 | Published: 15 Apr 2010

Guidance Software, Inc.

Information Security ANZ Nov 2015
sponsored by TechTarget ANZ
EZINE: In this issue we look at the true cost of a data breach to an Australian organisation.
Posted: 09 Nov 2015 | Published: 09 Nov 2015

All resources sponsored by TechTarget ANZ

Global Bank Eliminates Kubernetes CertificateBased Outages with Jetstack Secure
sponsored by Venafi
CASE STUDY: Read this case study to learn how Venafi’s guidance helped a multinational bank manage machine identities in cloud native environments to prevent future outages.
Posted: 29 Apr 2022 | Published: 30 Apr 2022


Cloud Native Security at Developer Speed
sponsored by Venafi
WHITE PAPER: Jetstack Secure can help provide full visibility and configuration status of each X.509 machine identity, as it identifies security vulnerabilities from misconfigurations across multiple clusters and will surface errors to allow fast remediation. Open this white paper to learn more.
Posted: 01 Mar 2022 | Published: 02 Mar 2022


How Malware Can Sneak Into Your Company Networks and How to Deal With It
sponsored by AVG Technologies USA, Inc.
WHITE PAPER: Taking your network offline might sound like the only effective way to keep viruses and other so-called malware out of your business. But even without the internet, there are still plenty of ways for malicious code to worm its way onto your network. Read this quick white paper for an overview of the main threats and how to protect against them.
Posted: 31 Mar 2010 | Published: 31 Mar 2010

AVG Technologies USA, Inc.

Your Guide to Modern Mobility
sponsored by SearchMobileComputing
EZINE: A mobile center of excellence can bring together all the important people an organization needs to build and implement a mobile strategy. Learn how companies form these groups and what they entail. Also, discover IT certifications available to mobility professionals, options for staffing and app dev platform tools.
Posted: 10 May 2016 | Published: 10 May 2016


E-Book: Strategic guide to insider threat detection and breach response
sponsored by SearchSecurity.com
EGUIDE: Data loss by insiders poses a significant threat to enterprises, so it's critical to have a plan in place to detect, prevent or mitigate the behaviors of malicious insiders. This expert e-book discusses strategies for implementing insider threat detection tools and provides 10 simple steps for building a robust security breach response plan.
Posted: 17 Mar 2011 | Published: 17 Mar 2011


E-Guide: Monitoring Strategies for Insider Threat Detection
sponsored by ArcSight, an HP Company
EGUIDE: Insider threat detection is a vital part of the security of any enterprise organisation. In this guide, learn about the three types of insider crimes and their own set of insider threat detection tactics.
Posted: 13 Dec 2010 | Published: 10 Dec 2010

ArcSight, an HP Company

Automated Indicator Sharing (AIS)
sponsored by Analyst1
DATA SHEET: Automated Indicator Sharing (AIS) is part of a CISA effort to create a cybersecurity ecosystem where public and private sectors exchange information about cyberthreats. Read this data sheet to learn more about AIS, including how to participate.
Posted: 01 Jun 2021 | Published: 01 Jun 2021

TOPICS:  Cybersecurity

What is IoMT Security?
sponsored by Palo Alto Networks
WHITE PAPER: The Internet of Things (IoT) looks drastically different depending on industry vertical. This white paper explores the IoT subclassification known as the Internet of Medical Things (IoMT), which encompasses any device connected to a healthcare provider’s network. Read on to learn about IoMT adoption and how to secure IoMT devices.
Posted: 24 May 2021 | Published: 24 May 2021

TOPICS:  Cybersecurity
Palo Alto Networks

Security for the Utility Grid
sponsored by Cisco IoT
INFOGRAPHIC: Global utilities are designing and building resilience in their modern grid deployments. This infographic highlights how Cisco aims to enable new business models to enhance grid security postures without compromising reliability or network response time. Read on to get started.
Posted: 22 Mar 2022 | Published: 22 Mar 2022

Cisco IoT

SSL Certificate Management: A Practical Guide
sponsored by Symantec Website Security
EGUIDE: This expert e-guide breaks down SSL certificate management into practical, accessible terms. Discover the basics of SSL certificates, learn how you can prevent and troubleshoot problems in certificate management, and see examples of SSL certificate management tools at work.
Posted: 11 Feb 2016 | Published: 08 Feb 2016

Symantec Website Security

Vulnerability and Patch Management
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Software patches can be a pain point for IT teams. Whether it’s prioritizing and deploying the software, rebooting hardware, or helping end users through the process.Read how implementing an efficient patch management lifecycle can reduce your company’s attack surface, and increase your capacity to prevent and contain incidents.
Posted: 15 Apr 2022 | Published: 15 Apr 2022

WatchGuard Technologies, Inc.

From Printer to Recycled PC Risks: Securing Your Organization's Afterthoughts
sponsored by HP Inc
EGUIDE: In this e-guide, IT security pro Nick Lewis discusses the evolving security threat posed by embedded systems on standard enterprise networks, including some recent printer security vulnerabilities. Learn about potential mitigations you can put in place, and get bonus tips on keeping data safe in recycled PC components.
Posted: 14 Nov 2016 | Published: 02 Nov 2016

HP Inc

Robotics Advance With AI Technologies
sponsored by Wind River
WHITE PAPER: With the advent of more powerful AI and better communications technologies, industrial robotics are becoming more valuable than ever. Read on to learn how growth in the industrial robotics sector is being powered by innovative companies like Wind River which are aligning disparate, powerful technologies to drive unified growth.
Posted: 11 Jan 2022 | Published: 15 Nov 2021

Wind River

CockroachDB The Definitive Guide
sponsored by Cockroach Industries
EBOOK: CockroachDB is a distributed SQL database built to handle the demands of today’s data-driven applications. This comprehensive O’Reilly e-book will walk software developers, architects, and DevOps/SRE teams through the ways CockroachDB can create scalable, seamless cloud applications. Access your copy to learn more.
Posted: 12 May 2022 | Published: 04 May 2022

Cockroach Industries

2021 State of the Threat
sponsored by Dell SecureWorks
RESOURCE: 2021 was a year dominated by stories of cyberattacks: State-sponsored supply chain attacks, cyber-espionage, ransomware and more. Access this report, 2021 State of the Threat: A Year in Review, to learn more about the specific threats (and threat types) that made headlines in 2021.
Posted: 08 Feb 2022 | Published: 09 Feb 2022

Dell SecureWorks

Computer Weekly – 4 November 2014: Enterprises push for open standards
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out about a new push led by Shell and BP to define IT interoperability standards for the digital age. We learn how one company is introducing bitcoin support into its IT systems. And we ask whether the cloud price wars mean lower service levels from suppliers. Read the issue now.
Posted: 31 Oct 2014 | Published: 31 Oct 2014


Buyer’s Guide for Machine Identity Management
sponsored by Venafi & Intel
RESOURCE: This buyer’s guide provides you with a checklist to help evaluate which solutions provide the most agile management across all your certificate authorities. You’ll learn which capabilities provide the flexibility you need to protect keys and certificates across your organization. Download this buyer’s guide to learn more.
Posted: 07 Dec 2021 | Published: 08 Dec 2021

Venafi & Intel

Ransomware Lessons from REvil’s Return
sponsored by Comodo
WHITE PAPER: After the SolarWinds attacks exposed a giant backdoor into the networks of major organizations and government agencies, REvil launched a similar attack. Now, we have to answer the question of how businesses can manage to protect themselves without wasting time and resources to review of every file they download. Read this white paper to learn more.
Posted: 19 May 2022 | Published: 19 May 2022