Whitepapers
Cyber Security Hub provides enterprise security professionals with the most comprehensive selection of cyber security whitepapers from our own network or cyber security experts. All Cyber Security Hub members can research and be informed on a variety of topics through our collection of whitepapers.
Integrating Communications And Creating Operations Effectiveness
August 17 by Seth AdlerEven in the absence of a pandemic, change is the only constant in business. Companies are under constant threat of disruption by natural events and man made circumstances that must be managed effectively.
A Transformative Cyber Security Approach For Cloud Native Applications
August 11 by Seth AdlerCloud native applications are rapidly shaping the migration to omnichannel customer relationships and achieving enhanced resilience. While cloud applications are proving to be a catalyst in accelerating recovery from COVID-19, it is imperative to ensure cyber attacks do not slow it down.
An Integrated Approach to Embedding Security into DevOps – A Best Practices Guide
August 10 by Seth AdlerThe way companies develop and depend on software has changed – and never has it exposed them to more risk. When software is everywhere, everything becomes an attack surface.
The State of Penetration Testing Global Research 2020
August 03 by Seth AdlerIn today’s cyber threatscape, it’s becoming increasingly clear that security validation of the network controls and processes must take center stage in the organizational cyber security strategy.
Engaging Zero Trust Architecture
July 27 by Seth AdlerOrganizations with a proponderance of remote workers or a completely mobile workforce are considering switching to either a CASB (if their resources are 100% in the cloud) or a software-defined perimeter (SDP) if they operate a mix of on-premise, private cloud and public web applications and data.
Secure Cyber AI To Protect Your Dynamic Workforce
June 17 by Seth AdlerExplore eight real world case studies of threats the Darktrace Cyber AI Platform identified in SaaS environments. In every case, the threatening activity evaded static defenses, but was contained and actioned well before it could escalate into a crisis.
The State Of Zero Trust In Global Organizations
May 28 by Seth AdlerEven with regions around the world opening up, as people continue to shelter in place and work from home in response to COVID-19- the idea of a shifted security perimeter is now everyone’s reality.
Move Beyond Passwords
April 16 by Cyber Security Hub EditorTraditional authentication using a username and password has been the foundation of digital identity and security for over 50 years.
AI-Driven Cyber Attacks Are Not Years Away
March 30 by CSHub.com Editorial StaffIn discussions around the future of AI and cyber-threats, we often wonder when we can expect to see malicious or offensive AI attacks in the wild. While we have not yet seen conclusive evidence of execution, this report will show that all the tools and open-source research needed to facilitate an AI
The Role Of Human Factors In Enterprise Cyber Security
February 10 by CSHub.com Editorial StaffRegardless of the means of attack—email, cloud applications, the web, social media, or other vectors—threat actors repeatedly demonstrated the effectiveness of social engineering tactics. This whitepaper analyzes 1+ billion daily messages to determine what your organization can do to counter this.
Cyber Insecurity: Managing Threats From Within
January 14 by CSHub.com Editorial StaffHow are security executives managing the frequency and severity of people-centric threats? This whitepaper from the Economist Intelligence Unit provides a glimpse into the experiences and recommendations from cyber security leaders.
Facing The InfoSec Challenges Of Visibility And Fragmentation
December 11 by CSHub.com Editorial StaffEnterprises face two massive security challenges: visibility and fragmentation. These challenges and numerous competing priorities means that all new projects taken on by InfoSec teams need to be reprioritized around risk, capabilities, and ROI.