Understanding the threats can help you manage risks effectively.

Read the 2019 Verizon Data Breach Investigations Report (DBIR).
 
Written by security practitioners.
For security practitioners.

Data Breach Digest:
Best practices for protecting your business

These cybercrime case studies provide real-world insights to help you build stronger security policies.

 

Cybersecurity:
Rules, Mistakes & Excuses

There are no quick fixes for cybersecurity, but here are some things you should be doing now.

3 Simple Rules

Event Name 20px

Date NHG roman 20px

Location NHG roman 20px

Presenter Name NHG med 18px
Presenter Title NHG roman 18px

3 Common Mistakes

Event Name 20px

Date NHG roman 20px

Location NHG roman 20px

Presenter Name NHG med 18px
Presenter Title NHG roman 18px

3 Overused Excuses

Event Name 20px

Date NHG roman 20px

Location NHG roman 20px

Presenter Name NHG med 18px
Presenter Title NHG roman 18px

Event Name 20px

Date NHG roman 20px

Location NHG roman 20px

Presenter Name NHG med 18px
Presenter Title NHG roman 18px

Industry specific reports

Do you process credit card payments?  Are you charged with protecting patient health information? Then these reports are for you.
placeholder image

2018 Verizon Payment Security Report

The 2018 Payment Security Report is vital reading, not just for those tasked with PCI DSS compliance, but anybody responsible for data security or compliance with any security standard, eg. GDPR, HIPAA, FISMA.
placeholder image

Protected Health Information Report

The goal of this report is to inform security professionals in the healthcare industry—and anyone else who has a level of responsibility for the protected health information (PHI) of their employees—about the threats that they face.

Anticipate attacks
before they happen.

Take a look at some of our other research
to help protect you from cyber attack
placeholder image

Insider Threat Report

This comprehensive examination of internal threats facing organizations of all kinds has actionable, data-driven insights for CISOs and business leaders alike.
placeholder image

Mobile Security Index

Attackers are adapting to the mobile-first world and expanding their arsenals. 51% of sophisticated actors identified in the last year did target mobile devices.
placeholder image

Data Breach Digest

Data Breach Digest readers can put themselves in the shoes of various Incident Response stakeholders to improve their cybersecurity incident mitigation and response efforts.

Protect your business from these cyber threat pitfalls.

Every organization, big or small, needs to protect against these threats.  View these webinars to learn how to protect business.
placeholder image

Social engineering

Learn how to not fall victim to various social engineering tactics used by cyber criminals.
placeholder image

Employee misuse

An acceptable use policy is a good start toward preventing employee misuse, but don't forget procedures for data access by partners.
placeholder image

Insider threat

Insider threats include diverse motivations and tactics used to exploit corporate defenses in sabotaging data assets.
placeholder image

Dangerous surf

How do you ensure your charges maintain online safety - not putting customer, corporate or personal data at risk?

Strengthen your security to help protect your business from threats before they even happen.

Our security experts can help you assess your risks and response capabilities, and develop a security IT strategy and implementation plan.