NIST’s Guide to Application Whitelisting
NIST, the National Institute of Standards and Technology, has published a Guide to Application Whitelisting offering guidance on how to prevent intrusions and malware by using application whitelisting.
Bit9 + Carbon Black Data Breach Disclosure Report 2015
The data that companies keep about their customers is a highly valuable commodity in today’s connected world; providing access to their bank accounts, shopping habits and identities. However, high-profile data breaches at the likes of Target, Sony, and now Talk Talk have raised public awareness of the very real risks they face from cyber criminals looking to steal their data. As consumers become increasingly aware of the risks to their data, and there is more public pressure for tighter EU and government regulations, organisations will need to ensure that they have complete confidence in the safety of that data.
2015: The Most Prolific Year for OS X Malware
OS X malware is on the rise. Download the 2015 OS X Malware Research Report to learn why 2015 is the most prolific year for OS X malware.
2015 Point-of-Sale Security Mid-Year Health Assessment
Download the 2015 Point-of-Sale Security Assessment to learn why, despite increased budget and awareness of POS security threats, businesses are still at risk.
Windows Server 2003 End-of-Life Preparedness Survey
Bit9 + Carbon Black surveyed 500 IT professional to understand how organizations were preparing for Windows Server 2003 end of life. They found that many respondents remain unprepared to meet the challenges associated with the end of life of Windows Server 2003.
2014 EMEA Cyber Security Market Survey
Bit9 + Carbon Black surveyed UK enterprises to understand their security stance at the endpoint, and elsewhere. They found that respondents faced serious challenges in these areas as they grapple with a diverse landscape of cyber security threats from different factors.
2013 Server Security Survey Report
In October 2013, Bit9 conducted its third-annual survey on server security. In the past year, the inability to detect or stop advanced attacks has remained a constant challenge for enterprises. This survey was designed to analyze these challenges from respondents who are responsible for their organization’s security posture.
2013 Cyber Security Study
Forty-seven percent of surveyed organizations have suffered a cyber-attack in the past year – and a frightening 13 percent say they do not even know if they have been attacked.
These are among the results of the 2013 Cyber Security Study conducted by Information Security Media Group and commissioned by Bit9.
Bit9 Java Vulnerabilities Report: Write Once, Pwn Anywhere
Java was originally released with the slogan “write once, run anywhere,” which was intended to underscore its cross-platform capabilities. Over time, Java has become ubiquitous on endpoints, so “run anywhere” can be interpreted as referring to its ubiquity. Even as fewer websites and Web applications require Java in order to operate properly, the technology is pervasive on virtually every end-user system. For a variety of reasons, Java also has become a platform that is highly vulnerable to attack.
SANS Survey: Digital Forensics and Incident Response
To assess the current state of forensic investigations and emerging trends, the SANS Institute conducted an online survey of digital forensics practitioners in April and May of 2013. The results, summarized in this whitepaper, will help forensic professionals and their clients better prepare for future investigations and allocate resources, while helping guide educators and forensic tools vendors.
2012 Server Security Survey Report
In this report, we review the four key findings from the survey which highlight the increased need for greater control in identifying and stopping advanced attacks on valuable server resources before they execute—while decreasing the security-related administrative workloads of IT and security professionals.
Pausing Google Play: More Than 100,000 Android Apps May Pose Security Risks
A rapidly growing number of employees are using personal mobile devices to connect to their employers’ networks. While this bring your own device (BYOD) trend is popular with employees and businesses, it has a major downside: The personal devices accessing business-critical data enable a huge number of malicious and unauthorized applications to access enterprise networks. These applications pose an enormous security risk.
Workbook: Getting and Staying Ahead of Advanced Threats
This workbook is designed to help you stay ahead of advanced threats, control the costs of your current security environment, and identify opportunities for greater productivity