Internal Nonhostile Structured Threats White Papers

(View All Report Types)
The 2008 (ISC)2 Global Information Security Workforce Study
sponsored by ISC2
WHITE PAPER: Information security professionals are facing a growing amount of pressure. This survey provides detailed insight into the important trends and opportunities emerging in the information security profession worldwide.
Posted: 03 Jun 2008 | Published: 03 Jun 2008

ISC2

Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER: This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007

VeriSign, Inc

Effectively manage access to systems and information to help optimize integrity and facilitate compliance
sponsored by IBM Software Group
WHITE PAPER: Consistent access management and identity management protect data integrity and facilitate compliance. IBM identity and access management solutions help you cost-effectively provide authorized users with access while protecting applications and data.
Posted: 09 Jan 2008 | Published: 09 Jan 2008

IBM Software Group

Global Threat Research Report: Russia
sponsored by VeriSign, Inc
WHITE PAPER: This report takes an in-depth look at the security threat the Russian Business Network (RBN) is to North American-based enterprise businesses. Learn more about their current infrastructure, its corruption, and the impact the RBN has on business today.
Posted: 16 Nov 2007 | Published: 10 Jan 2007

VeriSign, Inc

Web Based Attacks
sponsored by Symantec Corporation
WHITE PAPER: This report describes the anatomy of web based attacks and examines some of the factors that have influenced a shift toward this type of attack over the last year.
Posted: 11 Jun 2009 | Published: 01 Feb 2009

Symantec Corporation

Pod Slurping - An Easy Technique for Stealing Data
sponsored by GFI Software
WHITE PAPER: In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches.
Posted: 18 Sep 2006 | Published: 18 Sep 2006

GFI Software

Effectively Manage Access to Systems and Information to Help Optimize Integrity and Facilitate Compliance
sponsored by IBM
WHITE PAPER: This paper details a comprehensive, standards-based approach that integrates access control and identity management and enables you to cost-effectively provide users with access to applications and data while protecting assets from unauthor...
Posted: 19 Nov 2007 | Published: 01 Mar 2007

IBM

Protecting Credit Card Data: How to Achieve PCI Compliance
sponsored by Motorola Solutions
WHITE PAPER: This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
Posted: 20 Jun 2008 | Published: 01 Jul 2007

Motorola Solutions

Modernizing Security: Proactive PAM Solutions for Today
sponsored by One Identity
WHITE PAPER: In every enterprise IT environment, privileged accounts are instrumental in empowering administrators to manage the system effectively. However, the inherent risks associated with granting privileged access, as underscored in many of today's headlines, raise significant concerns for any organization, regardless of size or industry.
Posted: 12 Jun 2024 | Published: 12 Jun 2024

TOPICS:  Security
One Identity

Cyber threat on the rise: Why enterprises need to be on red alert with text and mobile phishing
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Last year's Verizon data breaches report found that 80% of all cyber security attacks started with a phishing email. In this e-guide, we take a look at how phishing can affect an enterprise, why text-based phishing is a growing threat and how to prevent and minimize mobile phishing attacks.
Posted: 06 Apr 2022 | Published: 06 Apr 2022

TechTarget ComputerWeekly.com

Computer Weekly – 30 August 2016: Get protected
sponsored by TechTarget ComputerWeekly.com
EZINE: It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.
Posted: 08 Feb 2021 | Published: 30 Aug 2016

TechTarget ComputerWeekly.com

Using MITRE ATT&CK® in Threat Hunting and Detection
sponsored by Exabeam
EBOOK: Enhance your threat hunting and detection with the MITRE ATT&CK framework. This guide covers adversary tactics and techniques, offering practical examples for security monitoring. Learn to identify system masquerading, internal proxies, data exfiltration, and drive-by compromises and transform security with intelligence-based detection.
Posted: 02 May 2025 | Published: 30 Apr 2025

Exabeam

Using MITRE ATT&CK® in Threat Hunting and Detection
sponsored by Exabeam
EBOOK: Enhance your threat hunting and detection with the MITRE ATT&CK framework. This guide covers adversary tactics and techniques, offering practical examples for security monitoring. Learn to identify system masquerading, internal proxies, data exfiltration, and drive-by compromises and transform security with intelligence-based detection.
Posted: 29 Apr 2025 | Published: 30 Apr 2025

Exabeam

Gamma International: The Macedonia files
sponsored by TechTarget ComputerWeekly.com
RESOURCE: This PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.
Posted: 08 Feb 2021 | Published: 23 Nov 2017

TechTarget ComputerWeekly.com

Ten Ways to Defend against Insider Threats
sponsored by Pure Storage Cyber Resilience
WHITE PAPER: Insider threats account for 25% of cybersecurity incidents. This white paper outlines ten strategies to defend against these oncoming threats, including tactics for improved visibility, automated patches, robust controls, and employee education. Read the full paper to enhance your cyber threat defense strategy.
Posted: 16 May 2025 | Published: 16 May 2025

Pure Storage Cyber Resilience

Guide to safeguarding payroll data in internationally expanding organisations (SG)
sponsored by ADP
RESEARCH CONTENT: Despite the increasing cyber-attacks and data insecurity trends, only 52% of today’s companies report that they’ve developed a playbook and a contingency plan across their geographies. This is concerning, especially for payroll teams. Browse this report to learn more.
Posted: 07 Feb 2024 | Published: 07 Feb 2024

TOPICS:  .NET
ADP

CW EMEA - January 2023: Protecting the privacy of schoolchildren
sponsored by TechTarget ComputerWeekly.com
EZINE: In this month's CW EMEA, we look at how schools in Germany have stopped using Microsoft Office 365 over lack of clarity over how data is collected, shared and used. We also delve into how former UK spy boss Richard Dearlove leaked names of MI6 secret agent recruiters in China to back an aggressive right-wing US campaign against tech company Huawei.
Posted: 11 Jan 2023 | Published: 12 Jan 2023

TechTarget ComputerWeekly.com

Bastille Threat Research: Insider Threat
sponsored by Bastille
WHITE PAPER: Insider threats can exploit wireless devices to infiltrate corporate networks. This white paper explores real-world case studies and best practices to secure your wireless environment and mitigate insider risks. Read the full white paper to learn how to protect your organization.
Posted: 19 Feb 2025 | Published: 20 Feb 2025

Bastille

January ezine: SD-WAN is taking off
sponsored by MicroScope
EZINE: There has been plenty of talk about SD-WAN and the moment has arrived where the technology is making money for the channel
Posted: 08 Feb 2021 | Published: 04 Jan 2019

MicroScope

World Economic Forum Global Risks Report 2018
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: The World Economic Forum Global Risks Report 2018 identifies the top geopolitical risks facing the world in 2018. Environmental risks dominate, but cyber attacks, the risks of artificial intelligence, and the possibility of the internet defragmenting are high on the agenda.
Posted: 08 Feb 2021 | Published: 17 Jan 2018

TechTarget ComputerWeekly.com

Computer Weekly – 5 March 2019: Modernising IT at the Bank of England
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the Bank of England as it starts the modernisation programme for its core system. We look at the rise of DevSecOps and how it can help deal with increasingly complex security threats. And we examine the different approaches to storage for structured and unstructured data. Read the issue now.
Posted: 08 Feb 2021 | Published: 05 Mar 2019

TechTarget ComputerWeekly.com

The Ultimate Guide to Threat Response
sponsored by Exabeam
EBOOK: This guide details threat response as a continuous process for managing cybersecurity threats. It includes the six steps of incident response, key CSIRT roles, and five tips for successful implementation. Read the e-book to master threat response strategies and to discover how automation, visibility, and analytics can enhance security.
Posted: 29 Apr 2025 | Published: 30 Apr 2025

Exabeam

The Ultimate Guide to Threat Response
sponsored by Exabeam
EBOOK: This guide details threat response as a continuous process for managing cybersecurity threats. It includes the six steps of incident response, key CSIRT roles, and five tips for successful implementation. Read the e-book to master threat response strategies and to discover how automation, visibility, and analytics can enhance security.
Posted: 02 May 2025 | Published: 30 Apr 2025

Exabeam

Jargon buster guide to database management
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This Jargon Buster e-guide to contemporary database management is an aid to stepping back and thinking afresh about an area of enterprise IT that has many decades of heritage. Or, as many sometimes (arguably rudely) put it, legacy.
Posted: 08 Feb 2021 | Published: 05 Jul 2018

TechTarget ComputerWeekly.com

A Process is No One
sponsored by SpecterOps
WHITE PAPER: This paper outlines a five-step hypothesis-driven method for threat hunting, targeting malicious activities that bypass standard security. Through a case study on Access Token Manipulation, it demonstrates identifying and detecting threats in Windows environments. Read the white paper to enhance your organization's threat hunting skills.
Posted: 02 May 2025 | Published: 02 May 2025

SpecterOps

The Ultimate Guide to Threat Investigation
sponsored by Exabeam
EBOOK: Most organizations have automated less than 50% of threat detection and have visibility into only 66% of their IT environments. By standardizing processes and integrating tools, security teams can detect threats faster and respond effectively. This e-book explores tactics for improving threat investigation.
Posted: 29 Apr 2025 | Published: 30 Apr 2025

Exabeam

The Ultimate Guide to Threat Investigation
sponsored by Exabeam
EBOOK: Most organizations have automated less than 50% of threat detection and have visibility into only 66% of their IT environments. By standardizing processes and integrating tools, security teams can detect threats faster and respond effectively. This e-book explores tactics for improving threat investigation.
Posted: 02 May 2025 | Published: 30 Apr 2025

Exabeam

Threat hunting frameworks, techniques and methodologies
sponsored by EclecticIQ
EGUIDE: To improve their security operations and investigation, some organizations have started to implement threat hunting frameworks into their existing intelligence systems and strategies. However, while threat hunting is on the rise, it’s still a relatively new concept. Access this e-guide to discover more.
Posted: 29 Jan 2025 | Published: 29 Jan 2025

EclecticIQ

Exploring the Darknet
sponsored by Bitdefender
EBOOK: This e-book explores the hidden world of the darknet and its diverse subcultures, from cybercriminals to whistleblowers. Inside, you'll delve into the evolution of cybercrime, the social structures, and the challenges faced by law enforcement. Download now to understand the complexities of the darknet.
Posted: 25 Feb 2025 | Published: 03 Mar 2025

Bitdefender

The Ultimate Guide to Insider Threats
sponsored by Exabeam
EBOOK: Insider threats pose security risks, whether malicious, negligent, or compromised. This guide explores detection strategies using AI, real-world examples, threat activities, and defense best practices. Learn how SIEM solutions establish behavioral baselines to spot anomalies early. Read this e-book to enhance your insider threat program.
Posted: 09 Apr 2025 | Published: 05 Apr 2025

Exabeam

The Ultimate Guide to Insider Threats
sponsored by Exabeam
EBOOK: Insider threats pose security risks, whether malicious, negligent, or compromised. This guide explores detection strategies using AI, real-world examples, threat activities, and defense best practices. Learn how SIEM solutions establish behavioral baselines to spot anomalies early. Read this e-book to enhance your insider threat program.
Posted: 05 Apr 2025 | Published: 05 Apr 2025

Exabeam

The Race to Support Overwhelmed Security Teams With XDR and SOC Modernization
sponsored by Trend Micro
ESG RESEARCH REPORT: Security teams struggle with evolving threats, growing attack surfaces, and increasing alerts. This research shows how organizations address these challenges through XDR adoption, tool consolidation, and automation. Discover strategies for modernizing your SOC in this report.
Posted: 12 Apr 2025 | Published: 12 Apr 2025

Trend Micro

How do Iconic Business Models such as Airbnb Emerge?
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Brands such as Airbnb disrupt industries and change how consumers think about the market, according to this research from Cass Business School, City University London.
Posted: 08 Feb 2021 | Published: 16 Mar 2016

TechTarget ComputerWeekly.com

Computer Weekly - 23 February 2021: Computers in space - managing a datacentre on the ISS
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the International Space Station gets a datacentre upgrade, we look at the challenges of system maintenance in space. As nation states increase their cyber attacks, we assess the risk for businesses. And our latest buyer's guide looks at the colocation market. Read the issue now.
Posted: 15 Mar 2021 | Published: 23 Feb 2021

TechTarget ComputerWeekly.com