Top White Papers and Webcasts

  • The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new security tool is released, threat actors strive to develop a way around it.  One advanced threat technique that is experiencing success is the use of fileless attacks, where no executable file is written to disk.     The 2017 Verizon Data Breach Investigations Report found that 51 percent of cyberattacks are malware-free, so there’s no indication that these attacks …

  • Driven by new technologies in the classroom and the proliferation of mobile devices and digital content, K-12 schools and districts report their networks are being stretched — a trend that might continue as more schools explore emerging technologies such as smart transit and the Internet of Things (IoT). To identify network technology needs and priorities for K-12 education, the Center for Digital Education (CDE) surveyed K-12 IT employees and K-12 network professionals. Read this research report to …