Whitepaper archive

Latest topics:

Supply chains in the cognitive era - How technology plus humans will boost predictive capabilities

Developments in technology, including artificial intelligence (AI), machine learning and the Internet of Things (IoT), offer the opportunity to take a high-powered, cognitive approach to supply chain optimization. With smart u...

View Whitepaper

Looking Beyond the Last Mile for Supply Chain Digitization

Global freight transportation revenues are expected to reach $2.5 trillion by 2023. The entire supply chain must be digitized, connected, transparent, and secure to enable promised efficiencies and flexibility. Continued rapid ...

View Whitepaper

Extreme weather trucking - Rerouting around hazardous areas with location intelligence

Earth’s climate is changing and becoming increasingly volatile. Extreme weather events, such as floods, droughts, blizzards and hurricanes occur with greater frequency around the globe. In addition to the toll hazardous weather...

View Whitepaper

Location Intelligence: Bridging a gap in the retail industry

While the retail industry has made great strides in understanding the digital journeys of consumers, it has been difficult to observe and analyze their whereabouts and movements in the physical world. Advanced location-enabled...

View Whitepaper

Relevance is everything - Location insights deepen customer engagement

We are in the midst of a fascinating and constantly changing time in the advertising and marketing worlds, with great advancements in technology providing more opportunity for better understanding consumers’ motivations and hab...

View Whitepaper

Using MITRE ATT&CK™ in Threat Hunting and Detection

MITRE ATT&CK1 is an open framework and knowledge base of adversary tactics and techniques based on real-world observations. ATT&CK provides a common taxonomy of the tactical objectives of adversaries and their methods. ...

View Whitepaper

The Security Operations Maturity Model: Quick Reference Guide

Organisations should think of security operations as a critical business process. Effective security operations are the first line of defence when it comes to preventing cyberattacks. To accomplish this, organisations need matu...

View Whitepaper

LogRhythm for SWIFT Customer Security Controls Framework

Society for Worldwide Interbank Financial Telecommunication (SWIFT) facilitates a huge number of financial transactions every day via the secure messaging system it provides to its members. In addition to banks, the system is a...

View Whitepaper

Defeating threats through user data: Applying UEBA to protect your environment

You’re facing a constant barrage of threats, some of which you don’t even know exist. The reality is that your users are behind many threats and breaches — whether maliciously or accidentally. Case in point: 69 per cent of orga...

View Whitepaper

Budgeting for a modern SIEM: A guide to managing financial risk

For CEOs, growth is a welcome challenge — it’s an indicator that business is healthy. But growth also poses a real challenge for CISOs for two reasons: First, when budgeting for a security information and event management (SIEM...

View Whitepaper
Register for our newsletter
The most important news for free via E-Mail