Please find below a carefully selected list of relevant White Papers.
Please Login or register as a teissMember to access any of these.

A helpful guide for businesses: Data Breach Response Readiness

A helpful guide for businesses: Data Breach Response Readiness

With awareness of data breaches at an all-time high board members and senior leaders are increasingly involved in their organisations data breach readiness planning. Additionally many organisations are now investing time to establish employee privacy and cyber security programmes to raise awareness of the threats and manage increasing risk.

Buyer's Guide to Backup & Recovery

Buyer's Guide to Backup & Recovery

Backup and recovery need a radical rethink. When today’s incumbent solutions were designed more than a decade ago, IT environments were exploding, heterogeneity was increasing, and backup and recovery systems were viewed as the protection scheme of last resort.

Developers are taking over Appsec

Developers are taking over Appsec

Developers across the industry are stepping up to take more responsibility for their code's vulnerability management. In this report we discuss trends in how security is shifting left to the earliest stages of development, putting the power developers in the front seat. We explore the growth of automated tools aimed at helping developers do more with fewer resources and look for answers on what is needed to help close the gap from detection to remediation.  

GDPR in nine simple steps

GDPR in nine simple steps

GDPR seems to be just around the corner. And for some organisations, even those that are already compliant with the Data Protection Act (DPA), achieving compliance seems like an overwhelming task. And let’s face it, most organisations are not compliant with the DPA, even if they think they are. If you are starting from a low compliance base then meeting the challenges of GDPR requirements can look very daunting.

GDPR in nutshell: An infographic report

GDPR in nutshell: An infographic report

We are now in the year of GDPR. In May, all companies will need to comply. The maze of compliance is solvable. We have summarised the new regulations that you need to follow, and also detailed our top nine steps to be GDPR-compliant in a handy infographic that is both easy to read and follow.

International Data Breaches: Have you thought of everything?

International Data Breaches: Have you thought of everything?

Our frontline data breach team has spent more than 10 years dealing with a broad range of challenging data breach response scenarios. Through their expert eyes, here is a Viewpoint paper that talks about some of the considerations.

Responding to a Cyber Breach

Responding to a Cyber Breach

The worst has happened and, despite all your care, hackers have broken through your information security defenses and stolen data. You need to respond to the data breach.

Social Media Risk

Social Media Risk

As social media ad spend surpasses the amount spent on TV for the first time, and mobile video traffic continues to rise with predictions that it will account for 75% of total mobile data traffic by 2020, businesses and individuals need to be more aware of the social media risks they could be facing.

The Definitive Guide to Rubrik Cloud Data Management

The Definitive Guide to Rubrik Cloud Data Management

Rubrik is the world’s first Cloud Data Management platform that delivers data protection, search, analytics, and copy data management to hybrid cloud enterprises. Download this guide to learn more about...