Asia's Source for Enterprise Network Knowledge

Wednesday, May 22nd, 2019

Information security threats

2018 risk:value report, prevention is better than the cure

This report is a survey of 1,800 global business decision makers, to understand their cybersecurity stance. Regrettably, it shows that many organizations are still stuck in a reactive mindset when it comes to security.
By downloading this document, your details might be provided to the sponsor. If you cannot download the document, please contact us.

Top 10 public cloud security recommendations

Just as the nascent adoption of the public cloud introduces new business, productivity and agility opportunities, so too does it expose potential security risks. This paper is intended to arm security teams with the information they need to engage early, ask appropriate questions and work toward protecting the public cloud as vigilantly as the data center.

By downloading this document, your details might be provided to the sponsor. If you cannot download the document, please contact us.

Cryptocurrency gold rush on the dark web

Carbon Black has found that modern-day cybercriminals are increasingly using the dark web to facilitate cryptocurrency theft on a large scale. Read on to find out more.

By downloading this document, your details might be provided to the sponsor. If you cannot download the document, please contact us.

Threat prevention solution brief

This document discusses how the Gigamon inline bypass threat prevention solution will help you reduce costs while simultaneously maximizing prevention tool performance, network resiliency and operational efficiency.

By downloading this document, your details might be provided to the sponsor. If you cannot download the document, please contact us.

Secure connectivity for networked industrial machines and the internet of things

Concerns have been raised that the internet of things is being developed too rapidly, without appropriate consideration of the profound security challenges involved. Whereas traditional cyber criminals target information and financial assets, hackers exploiting vulnerabilities in the internet of things. Security should not be an afterthought in the expansion of IoT.

By downloading this document, your details might be provided to the sponsor. If you cannot download the document, please contact us.

Can “cleanpipe” really deliver clean traffic?

Nexusguard’s research findings reveal that communications service providers (CSPs) are increasingly abused by perpetrators as a tunnel to direct DDoS attacks to their downstream networks. This new breed of attacks are carried out in a stealthy way that they can easily bypass detection. Faced with evolving DDoS attack patterns and tactics that are more difficult to detect and mitigate, service providers are presented with a dilemma. Should they just pass on the attack traffic, knowingly or unknowingly, to the victim customer?

2018 global threat intelligence report

The NTT Security 2018 Global Threat Intelligence Report highlights notable threats, incidents and trends observed during the previous year. This report illustrates shifts in attacker focus across geographic regions and industry sectors, helping provide a deeper understanding of what organizations should consider during business operations, as well as for business continuity and disaster recovery planning.
By downloading this document, your details might be provided to the sponsor. If you cannot download the document, please contact us.

Move up the cybersecurity value chain: busting the myths holding back CSPs from offering DDoS mitigation-as-a-service

This whitepaper examines what is holding back organizations from moving their distributed denial of service (DDoS) defenses to the cloud, and discusses the benefits and cost savings of outsourcing DDoS protection to a specialised managed security service provider (MSSP).
By downloading this document, your details might be provided to the sponsor. If you cannot download the document, please contact us.

Turn DDoS challenge Into opportunity for CSPs to succeed in DDoS protection and mitigation market

Communications service providers (CSPs) must turn to a scalable, more effective solution to build the organization’s resilience and capability to protect the core network and deliver truly clean traffic to customers.
By downloading this document, your details might be provided to the sponsor. If you cannot download the document, please contact us.

Threat report: distributed denial of service

This document discusses the current state of global distributed denial of service (DDoS) attacks as of Q4 2018.
By downloading this document, your details might be provided to the sponsor. If you cannot download the document, please contact us.