Ransomware Response Guide
Cybersecurity guide outlining variants of Ransomeware and how to respond to incidents.
Stories from the Frontline : Combating Cybercriminals
Cybersecurity Professionals share their discoveries working on the latest Cybersecurity breaches.
The Numbers Game - How Many Alerts is Too Many?
A closer look at Alert Management- are more alerts the answer to your security needs?
Know Your Cyber Enemy
Tight security posture against cybercriminals is made easier when you understand their motives.
How Secure Do You want To Be?
Work out how secure you need to be then take the journey to determine your security needs.
5 Reasons Why SMBs are Prime Targets for Cyber Attacks
Smaller companies are just as desirable a cyber target and suffer data breaches more often.
2017 Cyber Defence Report
Executives share their thoughts on the risks they face and how their resources are deployed.
2017 Cost of Data Breach Study - Australia
Annual benchmarking report outlining the cost of data breach incidents to Australian companies
IBM X-Force Threat Intelligence Report 2016
A valuable report outlining the state of Security, highlights and what trends are being seen.
How to make application security a strategically managed discipline
Application security professionals and their effectiveness at managing application security risk.
Is Risk Management a Strategic Discipline in your Organization?
Today’s application security managers face a perfect storm when it comes to managing risk.
5 Steps to Achieve Risk Based Application Security Management
IT and business management have no visibility into the overall state of application security.
Manage Application Security Risks To Help Protect Your Critical Data
Failure to prioritize application security can leave your entire environment at risk.
The Numbers Game: How Many Alerts are too Many to Handle?
Large enterprise rely on security personnel to fulfill multiple roles and responsibilities – critical alert.
Stop The New Breed of Email-based Cyber Attacks
Email represents a critical attack vector to address.
Lower costs and reduce risk exposure by identifying web-based and mobile application source code vulnerabilities early in the software development lifecycle.
Dragonfly Technologies Application Security Services
Featured Free Workbook
The time is now - Secure your organisation from threats you can and can't see.
There are two types of companies: Those that have been hacked, and those who don’t know they have been hacked.
So how can you protect your organisation from unknown threats?