Security Spending Reports

Insights into attacker activity in compromised email accounts
sponsored by Barracuda
WHITE PAPER: Spear phishing and email account takeovers are proving to be a lucrative and accessible opportunity for cybercriminals – and attack methods are only growing more sophisticated. This report provides an overview of today’s top email security threats and offers defensive best practices for protecting your inboxes.
Posted: 08 Feb 2021 | Published: 31 Jul 2020

Barracuda

Five Pillars of an actionable Cloud Security Framework in Azure
sponsored by Barracuda
WHITE PAPER: In order to ensure a responsible cloud migration, organizations need to ensure that they secure the network, applications and data that will reside in their cloud environment. This white paper takes the widely used NIST Cybersecurity Framework and turns it into 5 actionable pillars. Read on to get started.
Posted: 08 Feb 2021 | Published: 16 Jun 2020

Barracuda

Solving the Challenges of Modern Remote Access
sponsored by Barracuda
WHITE PAPER: The recent pandemic has brought about a dramatic movement towards enabling users to work remotely. Included are the results from a recent study conducted by Gartner to help security and risk management leaders solve the challenges of quickly scaling large scale modern remote access. Read on to discover their key findings.
Posted: 08 Feb 2021 | Published: 25 Mar 2020

Barracuda

Spear Phishing vol3: Top Threats and Trends: Defending against business email compromise attacks
sponsored by Barracuda
WHITE PAPER: Business email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.
Posted: 08 Feb 2021 | Published: 30 Nov 2019

Barracuda

7 Ways to Take Cybersecurity to New Levels
sponsored by Cisco
WHITE PAPER: Contrary to popular belief, more security tools don’t always mean better security. As business environments grow more complex, it’s critical for security to have a holistic, unified approach. Read this white paper to discover 7 ways organizations can enhance their security stack with cloud security, without sacrificing customization and control.
Posted: 08 Feb 2021 | Published: 21 May 2020

Cisco

A guide to build vs. buy service models for threat detection and response
sponsored by AT&T Cybersecurity
WHITE PAPER: Many important considerations and factors go into choosing DIY vs. managed service models for threat detection and response. Each has pros and cons, plus tradeoffs from both a risk and cost perspective. In this guide, decide which path is best for your organization today.
Posted: 08 Feb 2021 | Published: 07 May 2020

AT&T Cybersecurity

Enable and Secure Remote Work During the COVID-19 Pandemic
sponsored by Barracuda
PRODUCT OVERVIEW: The recent global outbreak has led to a dramatic and rapid movement towards remote workforces, and IT teams are tasked with ensuring each employee and device is enabled and secure. This solution brief highlights the key features of a few Barracuda offerings designed to take the stress out of this shift. Read on to learn more.
Posted: 08 Feb 2021 | Published: 06 Apr 2020

Barracuda

CASE STUDY: Tricentis slams the door on C-level email attacks using Barracuda Sentinel
sponsored by Barracuda
VIDEO: Tune into this video to discover how Tricentis managed to thwart spear phishing and fraud attacks against senior staff by adding AI-powered Barracuda Sentinel to their security arsenal.
Posted: 08 Feb 2021 | Premiered: 31 May 2019

Barracuda

Tech-Savvy English Public School Streamlines Office 365 Security
sponsored by Barracuda
CASE STUDY: Download this case study to learn how IT Director Tony Whelton was ultimately able to provide the Wellington College’s students and staff with more flexible, secure notebook protection without straining IT budget or resources.
Posted: 08 Feb 2021 | Published: 09 Oct 2019

Barracuda

Best Practices for Protecting Against Phishing, Ransomware and Email Fraud
sponsored by Barracuda
WHITE PAPER: Download this Osterman Research white paper to learn more about the growing success of cyber threats, the top incidents that are concerning decision makers, and 10 tactics for fending off these advanced attacks.
Posted: 08 Feb 2021 | Published: 30 Apr 2018

Barracuda

Spear Phishing: Top Threats and Trends Vol. 1
sponsored by Barracuda
RESOURCE: This report takes an in-depth look at the three most prevalent types of spear phishing attacks—brand impersonation, business email compromise, and blackmail—and examines 8 defense strategies for preventing these attacks. Read on to learn how to put these strategies to work to protect your company.
Posted: 08 Feb 2021 | Published: 31 Mar 2019

Barracuda

SIEM, SOAR or both? Our security experts weigh in
sponsored by ComputerWeekly.com
EGUIDE: In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
Posted: 21 Dec 2020 | Published: 21 Dec 2020

ComputerWeekly.com

Royal Holloway: Purple team playbook – threat modeling for security testing
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The reality of information security is that it is impossible to completely ensure that an attacker cannot get into the corporate network. Instead, companies should look at how they prepare and react to security attacks by gaining an understanding of how cyber criminals work by combining the talents of red teams and blue teams
Posted: 14 Jul 2020 | Published: 15 Jul 2020

ComputerWeekly.com

RSA Conference 2020 guide: Highlighting security's human element
sponsored by ComputerWeekly.com
EGUIDE: The theme of the 2020 RSA Conference was the human element, and the event promised once more to live up to its reputation as the place "where the world talks security. This RSA Conference 2020 guide is your single stop to find all the latest breaking news and expert insights from one of the cybersecurity world's biggest annual gatherings.
Posted: 04 May 2020 | Published: 04 May 2020

ComputerWeekly.com

Infographic: 5 ways to achieve a risk-based security strategy
sponsored by ComputerWeekly.com
EGUIDE: In this infographic, learn five steps to implement a risk-based security strategy that naturally delivers compliance as a consequence of an improved security posture.
Posted: 12 Mar 2020 | Published: 12 Mar 2020

ComputerWeekly.com

A Computer Weekly buyer's guide to zero-trust security
sponsored by ComputerWeekly.com
EGUIDE: Zero trust is a conceptual architectural model that uses microperimeters and microsegmentation to secure corporate networks. In this 12-page buyer's guide, Computer Weekly looks at why trust should be considered a security risk and the need for additional authentication strategies to have an appropriate level of security.
Posted: 09 Mar 2020 | Published: 09 Mar 2020

ComputerWeekly.com

Infographic: 5 ways to achieve a risk-based security strategy
sponsored by ComputerWeekly.com
EGUIDE: In this infographic, learn five steps to implement a risk-based security strategy that naturally delivers compliance as a consequence of an improved security posture.
Posted: 16 Aug 2019 | Published: 16 Aug 2019

ComputerWeekly.com

Infographic: 2019 Europe IT Priorities - Security
sponsored by ComputerWeekly.com
EGUIDE: In this infographic, we take a look at which elements of IT security are being improved by enterprises across Europe. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.
Posted: 23 Apr 2019 | Published: 23 Apr 2019

ComputerWeekly.com

Ponemon - Costs and Consequences of Gaps in Vulnerability Response
sponsored by ServiceNow
WHITE PAPER: Ponemon Institute surveyed almost 3,000 IT security professionals across the globe to understand how organizations are responding to vulnerabilities. This paper presents the findings of the most recent report and compares it to the 2018 study – read on for the complete results.
Posted: 08 Feb 2021 | Published: 06 Aug 2020

ServiceNow

5 IAM Trends Shaping the Future of Security
sponsored by Beta Systems
EGUIDE: Modern identity and access management (IAM) tools, capabilities and offerings are a direct result from years of cyberthreats targeting credentials, privileged accounts and passwords. Read this e-guide to discover 5 IAM trends that are shaping the future of the cybersecurity market.
Posted: 02 Nov 2020 | Published: 28 Oct 2020

Beta Systems

Incident Response Tools: How, When & Why to Use Them
sponsored by Claranet
EGUIDE: Incident response tools are growing in popularity as an effective method for proactively analyzing and addressing the vulnerabilities within your network. This e-guide was written to help readers through the vetting process as well as understand how, when and why to use them – read on to get started.
Posted: 21 Sep 2020 | Published: 17 Sep 2020

Claranet

Why You Should Consider Endpoint Detection & Response
sponsored by Claranet
EGUIDE: Endpoint security has become an especially hot topic over the past few months. Organizations need to put clamps on hackers who attempt to breach their infrastructure. As such, traditional legacy endpoint security systems may not be able to stand up to modern threats. Read this expert guide to learn about endpoint detection & response.
Posted: 10 Sep 2020 | Published: 10 Sep 2020

Claranet

What secure email gateways can do for your enterprise
sponsored by SearchSecurity.com
EBOOK: It is important to evaluate secure email gateways before implementing them in your organization. Here's a look at some of the best email security gateway products in the industry, as well as implementation, cost and uses.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

SearchSecurity.com

A Guide to SIEM Platforms, Benefits and Features
sponsored by SearchSecurity.com
EZINE: SIEM systems enable organizations to centralize indecent response, detection and handling, as well as data logging for compliance. This e-guide is a collection of resources highlighting SIEM benefits, criteria and tools. Read on to evaluate which SIEM system is right for you.
Posted: 09 Jan 2020 | Published: 09 Jan 2020

SearchSecurity.com

Cybersecurity: The Latest Battleground for MSPs
sponsored by SkOUT
EGUIDE: Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.
Posted: 03 Jul 2019 | Published: 01 Jul 2019

SkOUT