Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...
CLEAR

eBook | Presented by Proofpoint Inc

Stopping BEC and EAC Scams: A Guide for CISOs

Business email compromise (BEC) and email account compromise (EAC) are complex problems that require multi-layered defenses. Cyber attackers have countless ways of tricking your users, preying on their trust and exploiting their access to key data, systems and resources.

White Paper | Presented by Forcepoint LLC

The Habits of Highly Data-Secure Companies

This white paper explores one potential solution: implementing enterprise security systems fueled by powerful data analytics engines that take a user-centric view of data.

White Paper | Presented by Proofpoint Inc

The Top 10 BEC Scams

BEC attacks have become bigger, more brazen, and more costly than ever. Case in point: Toyota Boshoku, a subsidiary of the car manufacturer, lost $37 million to a BEC scam. That’s just one of many real companies who suffered real losses from this type of email fraud. The good news is Proofpoint has a layered approach to keep your email accounts and data safe.

eBook | Presented by OneLogin, Inc.

The Top 5 Reasons You Need a Customer Identity & Access Management (CIAM) solution

In this ebook, we discuss five critical use cases for Customer Identity and Access Management.

Surviving the cyber security storm

What can SMBs do to protect themselves?

White Paper | Presented by Forcepoint LLC

Protecting the Human Side of Cybersecurity

This paper explores the survey results and describes how working with a trusted and knowledgeable partner, such as Forcepoint, is key for success.

On the Cybersecurity Forefront: Behavioral Analytics to the Rescue

Join Bob Bragdon of IDG and Jim Fulton of Forcepoint as we explore the survey findings, including why behavioral analytics is growing in use and best practices from IT security practitioners.

White Paper | Presented by Honeywell

Honeywell Industrial Cybersecurity USB Threat Report 2020

Since publication of Honeywell's original USB threat report, there has been a general increase in awareness around the potential cyber risk of our friend the Universal Serial Bus.

eGuide | Presented by Kenna Security

How to Implement Risk-Based Vulnerability Management Now

The traditional everything-is-at-risk approach to vulnerability management (VM) no longer works in a world where vulnerabilities proliferate and hacker sophistication is constantly expanding the threat landscape.

Mastering Identity and Access Management

Discover expert recommendations for reviewing your current IAM architecture and securing sensitive data and critical systems in this whitepaper.

Load More