Latest Security Whitepapers

A Guide to frictionless Zero Trust for modern enterprises

CrowdStrike, a global cybersecurity leader, consider the challenges that Traditional Zero Trust solutions might have and how they provide a frictionless Zero Trust approach for enterprises that reduces costs and operational complexity.

CENSORNET: Empowering the People: Critical Cyber Security Challenges
We are at a new defining moment in the history of work and technology. Since the COVID-19 lockdown began, security and IT professionals across the globe have faced extraordinary challenges. Practically overnight, almost every employee became a ‘remote worker’, leaving most organisations in a position of increased exposure on an escalating scale. Now with uncertainty... Read More

McAfee MVISION Cloud Security: 360° Shared Responsibility Model
Introduction Shared responsibility models are important for effective security in computing. Security and compliance are everyone’s responsibility and not only something delivered only by the IT group. For cloud computing, cloud service providers (CSPs) provide some security protection. However, that doesn’t mean that cloud data is fully secure. CSPs correctly point out that the responsibility... Read More

Remote working essentials for IT teams
Although we saw this shift to a distributed remote work-force slowly approaching, today it has become a sudden reality. A recent Gartner HR survey has revealed that 41 percent of employees are likely to continue working remotely post the coronavirus pandemic. Making applications easily accessible and automating tasks to boost efficiency are imperative to ensure... Read More

The ISO 20000 Guide
What is ISO 20000? ISO 20000 is the internationally recognized standard for service management, which describes a set of management processes designed to help organizations deliver effective services. It is divided into a number of parts, out of which ISO 20000-1, defines the requirements necessary for a service management system (SMS). These are mandatory requirements... Read More

2020 Application Security Observability Report
Contrast’s “2020 Application Security Observability Report” provides insights gleaned from analysis of aggregate telemetry generated from applications during development, testing, and operations from Contrast Security customers between June 2019 and May 2020. Key findings include: • Vulnerabilities. Nearly all applications have at least one vulnerability, and more than one-quarter have a serious one. 11% of... Read More

Cloud Adoption and Risk Report: Work From Home Edition
The recent work from home mandate has dramatically changed how we live and work. Organizations are getting creative about how they can continue to operate productively when most of their employees are working from home. In normal times, most employees would be expected to work in the office, on the internal network. For anyone working... Read More

Spear Phishing: Top Threats and Trends
A specialized economy is emerging around email account takeover as cybercriminals find new ways to attack and exploit email accounts. This report takes an in-depth look at the threats organizations face from account takeover and the types of defense strategies you need to have in place to protect against these types of attacks.» Download the... Read More

Petya Ransomware Goes Low Level
Executive Summary The new Petya ransomware seems to have been built with speed in mind, as to expedite the encryption process. While traditional ransomware encrypts files one by one, Petya encrypts the location containing all information about disk files, such as size, permissions, and data content, essentially preventing users from accessing all their data. While... Read More

13 email threat types to know about right now
Radically reduce susceptibility to targeted email attacks A cyberattack can affect your business in many ways, depending on its nature, scope, and severity. According to the FBI’s Internet Crime Complaint Center (IC3), cybercrime cost $3.5 billion in losses in 2019 alone, with business email compromise (BEC) causing the most damages. That doesn’t include unreported losses,... Read More

Uprooting Mandrake: The Story of an Advanced Android Spyware Framework That Went Undetected for 4 Years
Even though similar financially motivated Android threats such as Anubis or Ginp were discovered, Mandrake stood in the shadow for at least 4 years. During this time, it stole data from at least tens of thousands of users. “It takes special care not to infect everyone” – This is exactly what the actor did and... Read More

Hacked Off!
Introducing Bitdefender Hacked Off! A comprehensive study into the cybersecurity attitudes of infosecurity professionals around the world. “From organisational weaknesses to infosec professionals’ pressure points and what they’re doing to combat them, Hacked Off! aims to shine a light on the current state of play of the global cybersecurity landscape by focusing on three core... Read More