Whitepaper

2018 State of Bug Bounty Report

The biggest difference between an unknown vulnerability and a known vulnerability, is the ability to take action on it.

Over the past year, there has been an increase of 21% in total vulnerabilities reported, and an increase of 36% in total bug bounty payouts.

Security leaders are beginning to realize that better awareness and information about disclosed vulnerabilities is critical to their operational success.

2018 State of Bug Bounty Report Read More »

Observations from the Front Lines of Threat Hunting

This report provides a summary of OverWatch’s findings from intrusion hunting during the first half (January through June) of 2018. It reviews intrusion trends during that time frame,
provides insights into the current landscape of adversary tactics and delivers highlights of notable intrusions OverWatch identified. OverWatch specifically hunts for targeted
adversaries. Therefore, this report’s findings cover state-sponsored and targeted eCrime intrusion activity, not all forms of attacks.

Observations from the Front Lines of Threat Hunting Read More »

Threats are rising

Just released! Cisco 2018 Asia Pacific Security Capabilities Benchmark Study. It also highlights the India overview on breach readiness & how companies can respond to today’s evolving threats. In fact, Asia-Pacific companies receive 6 cyber threats every minute. An attack is no longer a matter of if, but only a matter of time. It’s time to make security your business priority, once and for all. Download Now.

Threats are rising Read More »

Securing African Borders: Solutions and Technologies for Safer Borders

Border security remains one of the most pressing security challenges for most African countries. From terrorist groups to diamond smugglers and wildlife poachers, the illegal activities pose a severe threat to the security of Africa’s borders.
The following report provides an overview of the border threat landscape present throughout much of Africa, as well as recent efforts to curb such threats and the security gaps that need to be filled with the most relevant and cost-effective security solutions.

Securing African Borders: Solutions and Technologies for Safer Borders Read More »

Forrester Research Names Content Sprawl As A Top Challenge

With enterprises and OEMs looking to integrate search tools into their own products, Enterprise File Search (EFS) has emerged as one of the today’s hottest technology trends – with several recent high-profile IPOs and multimillion-dollar venture capital investments in the space. This market-shifting trend is fueled by the rise of Global File Search (GFS), a

Forrester Research Names Content Sprawl As A Top Challenge Read More »

Enterprise IoT Security Architecture and Policy Whitepaper

The IoT Security Foundation (IoTSF) has announced a new whitepaper that outlines the benefits that accrue by taking a hub-based approach to connecting IoT devices and systems in the enterprise. Entitled: IoT Security Architecture and Policy for the Enterprise – a Hub Based Approach the whitepaper proposes a hub-centric architecture approach that will accommodate contemporary and future possibilities

Enterprise IoT Security Architecture and Policy Whitepaper Read More »

Subsea cables and interconnection hubs – The interplay of diversifying routes and peering markets

This white paper assesses the correlations between the growing subsea cable market and the global market for network interconnection by delving into several topics: determining the core drivers of subsea supply and demand, exploring the route priorities of the new cable builders, determining which nodes are growing as interconnection markets, and evaluating cases of specific markets to see if subsea network and interconnection market development go hand-in-hand.

Subsea cables and interconnection hubs – The interplay of diversifying routes and peering markets Read More »