Browsing Category
Whitepapers
DISTRIBUTED DENIAL-OF-SERVICE (DDoS) ATTACKS: AN ECONOMIC PERSPECTIVE
While network security experts disagree on when the first Distributed-Denial-of-Service (DDoS) attack occurred, it!-->…
THE COST OF DDoS ATTACKS
At Cogeco Peer 1, we host over 8,000 customers, of whom 600 are e-commerce businesses. We fight distributed!-->…
Cybersecurity Dossier – a post malware age reality
The threat landscape is constantly evolving and threat actors today are more sophisticated, innovative, motivated!-->…
How to Play Your Role in Cybersecurity
For many agencies, cloud computing is a vital component of their IT strategy because it provides the flexibility!-->…
CYBER SECURITY RESOURCE PLANNING
CSRP defines organization cyber risks, priorities, technical mitigation tasks, individual responsibilities,!-->…
LTI’s Threat Hunting Service
Traditional security monitoring is proving to be insufficient in today’s fast-paced digital world of Cloud,!-->…
Top 6 Security Use Cases for Automated Asset Inventory
Automated asset inventory might not be the first thing that comes to mind when considering cutting-edge security!-->…
After the Windows 11 update, is it still worthwhile to pursue the CEH v11 course?
You've come to the correct place if you're having trouble deciding whether to enroll in the CEH v11 course right!-->…
Quantifying Risk: Closing the Chasm Between Cybersecurity and Cyber Insurance
Cyberattacks may be the biggest risk that global businesses are unprepared for.1 Record numbers of data breaches!-->…
Cyber-Insurance: Not One-Size-Fits-All
Despite headline-grabbing data breaches that have proven costly to organizations in many sectors, the purchase of!-->…