White Papers

Onapsis Cyber Report - ERP Applications Under Fire

As financially motivated cyber criminals turn their attention to the application layer, nation-state actors and other cyber attackers are increasingly targeting SAP and Oracle ERP applications in order to access highly sensitive information and to disrupt critical business processes. In this special report from Onapsis and Digital Shadows, discover how bad actors are increasingly attacking these mission-critical applications and the “crown jewels” that reside in them along with recommended steps that can be taken to mitigate risk.

Attribution: Onapsis

The Complete Guide to Building your Vendor Risk Management Program

According to a Deloitte study, more than 20% of companies have experienced a security breach of sensitive customer data from third-party actions. Whether it’s been placed on your radar by a regulator, your board or through other sources, odds are you have vendor risk management somewhere on your list of things to improve this year. This e-book from SecurityScorecard will show you how to improve your organization’s vendor risk management program in three steps and how to bring it to a mature state.

Attribution: SecurityScorecard

SecurityScorecard Big 500 Index - A Cybersecurity Analysis of 500 Major Publicly-Traded U.S. Companies

With cybercrime-related costs expected to hit $6 trillion annually by 2021, many executives fear that a single cyber-attack can cause a sudden stop to the growth and profitability of the company – and large companies like those within the S&P 500 are no exception. In this report, SecurityScorecard evaluated the cybersecurity practices of 500 large companies representative of the S&P 500, including their performance against specific risk factors.

Attribution: SecurityScorecard

CenturyLink: Revisiting the Cybersecurity Protection Myth

In this environment, it’s all about offense - how fast you can detect and respond to these threats. Yes, you still need to close the digital doors but you also have to add alarms and monitoring services in case they do get in - and they likely will. This paper revisits the protection myth and looks at practical countermeasures that deliver an economical but effective level of threat detection and response.

Attribution: CenturyLink

CenturyLink: Managed Security Services: Overcoming the Security Skills Gap

The challenge of keeping pace with the evolving threat landscape has been compounded by employee mobility and hybrid clouds, requiring organizations to adapt by investing in a contemporary set of tools, tactics, technologies, and skills to protect data assets from compromise and ensure business continuity.

Attribution: CenturyLink