Top White Papers and Webcasts

  • The recent string of Magecart, digital skimming and other client-side attacks have left businesses exposed to data theft, compliance penalties and brand damage. But how do these attacks actually happen?   In this on-demand webinar, PerimeterX security experts will perform a live simulation of a Magecart attack.   You will learn about: Methods and tricks used to compromise websites Data exfiltration mechanisms used by malicious scripts Detection techniques and their …

  • At the heart of every organization are its employees, the engine that drives growth, fueled by the data they create and store on their laptops, tablets, and mobile phones, as well as access through data center and cloud servers. It should come as no surprise to CISOs that 60 percent of corporate data is stored on employee endpoints. Cybercriminals are progressively targeting the valuable data contained on these enterprise endpoints. Read this eBook to discover how CISOs can secure the organization and minimize …