Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...


Ransomware Hostage Rescue Manual

by KnowBe4Mar 13, 2017

Get the most complete Ransomware Manual packed with actionable info that you need to have to prevent infections, and what to do when you are hit with ransomware. You will also receive a Ransomware Attack Response Checklist and Ransomware Prevention Checklist.

CEO Fraud Prevention Manual

by KnowBe4Mar 13, 2017

CEO fraud is responsible for over $3 billion in losses. Don't be next. The CEO Fraud Prevention Manual provides a thorough overview of how executives are compromised, how to prevent such an attack and what to do if you become a victim.

Report: Endpoint Protection Ransomware Effectiveness

by KnowBe4Mar 13, 2017

It's estimated that in 2016, the cost of ransomware was over $1 Billion, making it the most lucrative criminal business model in the history of malware. In this report we examined survey data of who is at risk, what the scope and cost of an attack is, how organizations are protecting themselves from ransomware, and the effectiveness of their endpoint protection. Find out what is really the best way to combat the threat of ransomware. The results might surprise you!

The Phishing Breakthrough Point

by KnowBe4Mar 13, 2017

Utilizing security awareness computer based training and simulated phishing security tests can be effective tools to reduce unintentional insider threats. However, if robust metrics are not put in place, phishing tests can create organizational social engineering blind spots. Find out more about the breakthrough point in an organization's phishing awareness level.

Survey Findings from "The State of Mid-Market Cybersecurity"

by Arctic Wolf NetworksMar 03, 2017

Arctic Wolf Networks recently conducted a survey in partnership with Vanson Bourne that reveals major gaps between the perception and reality of cybersecurity challenges. The survey found that mid-market enterprises had very high confidence in their cybersecurity defenses, but in reality they struggled to defend against malicious activity that has become more sophisticated, more targeted and severe.

The data revealed a cybersecurity dissonance among mid-market enterprises, highlighting

Gartner Market Guide for Managed Detection and Response (MDR) Services

by Arctic Wolf NetworksMar 03, 2017

Managed detection and response (MDR) services is an emerging group of security monitoring providers with approaches that do not fit the traditional MSS model.

Key findings from the report:

• Organizations struggle to deploy, manage and use an effective combination of expertise and tools to detect threats, especially targeted advanced threats and insider threats.
• A growing number of providers are offering outcome-based services that differ from traditional

To SIEM or not to SIEM

by Arctic Wolf NetworksMar 03, 2017

Every organization — no matter the size — has data, network, IP, and other information to protect. When implemented well, SIEM (Security Information and Event Management) is a great tool that can protect your information and keep your business secure.

But there's a catch: managing a SIEM is akin to riding a bike uphill. When you stop pedaling the bike, you stop moving altogether. Constant attention is required to keep things moving. Managing a SIEM is a full-time job,

Build or Buy? Security Operations Center Strategies for Midmarket Companies

by Arctic Wolf NetworksMar 03, 2017

"Weak mid-market defenses create not only the opportunity for attackers to extort resources from the business itself, but also the ability to use them as gateways to hack their enterprise partners."

Cyber attacks on mid-market companies are on the rise. In response to the growing number of the threats, companies are becoming increasingly aware of the need to strengthen their cybersecurity posture. However, identifying what makes a posture 'strong' is leading to a dissonance within the

Solution Brief: PCI DSS Security Compliance Checklist

by Arctic Wolf NetworksMar 03, 2017

The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards set by the PCI Security Standards Council to protect cardholder data. The PCI DSS applies to all entities that store, process, and/or transmit cardholder data.

PCI DSS is best achieved in two phases.

1. Setting the controls, where your organization plans and commits to becoming compliant. This phase typically involves planning, leadership commitment, and setting up of basic

Top 6 Things Small Businesses Need To Know About Cybersecurity

by Kaspersky LabMar 02, 2017

Small businesses often lack the budget, staff, and sophistication to assemble strong defenses, making them an easy target where the chances of thieves getting caught is much lower. And no company is "too small to be worthwhile" for the bad guys. Making sure your business is adequately protected can seem like an overwhelming undertaking. We've compiled a list of the top things startups and small businesses need to know about cybersecurity to help you get started.


Arctic Wolf Networks

Headquarters: 111 W. Evelyn Ave, Suite 115, Sunnyvale 94086

Arctic Wolf Networks provides SOC as a service that makes every link in the security chain stronger. Customer-dedicated security engineers anchor the service, act as the stewards of log data, and are focused on reviewing events, identifying incidents, and eliminating false positives.


KnowBe4, Inc. is the world's most popular integrated platform for Security Awareness Training and simulated phishing attacks. We help you manage the ongoing problem of social engineering.

KnowBe4 was founded on the principle that the human side of the cyber security industry is severely neglected. We have thousands of customers using our new-school security awareness training program to keep their networks safe.

We are in the business of training employees to make smarter security decisions.

Find out how affordable this is for your organization, you will be pleasantly surprised. Get a quote here: