Resources and content to help you monitor and combat defence grade cyber attacks
Access our industry-leading resources to improve your cyber resilience: case studies, compliance guides, white papers plus educational tools and videos.
Use the filter options below to quickly access the information you require.
Tools
Cyber Security for Critical Infrastructure
Explore how Huntsman Security's solutions can help support compliance with CIRMP review and reporting requirements utilising the...
Tools
SmartCheck for Directors (Ransomware Risk Management)
Explore how our Director’s Ransomware Risk Report could be implemented in your organisation to give you visibility of your...
White Papers
Cyber Security Predictions 2023
Every year’s predictions merge the trends in technology with events in the wider world. In a world still recovering from...
Tools
Top 10 Questions about Cyber Security Management for Executives & Directors (UK)
Good leadership and governance start with communications and the empowerment of your team. These questions are geared to support...
Tools
Ransomware threats and cyber insurance
Download the results of our survey conducted with senior security and audit professionals across all sectors on how ransomware...
Tools
Top 10 Questions about Cyber Security Management for Executives & Directors (AU)
Good leadership and governance start with communications and the empowerment of your team. These questions are geared to support...
MITRE
MITRE ATT&CK - Putting it into action
In this final instalment of the MITRE ATT&CK® Education & Implementation series we have identified a selection of targeted...
On-Demand Webinars
MITRE ATT&CK - A Practical Approach to Implementation
Watch our latest webinar session and stay current with both insights and knowledge on the cyber controls all organisations should...
MITRE
MITRE ATT&CK - Stealing the data
This is the third instalment in our analysis of an attack, and follows on from “MITRE ATT&CK® - Infiltrating the network”....
MITRE
MITRE ATT&CK - Infiltrating the network
This is the second instalment in our analysis of an attack, and follows on from “MITRE ATT&CK® - Compromising the perimeter”....
MITRE
MITRE ATT&CK - Compromising the perimeter
Following on from the introductory “MITRE ATT&CK® - An Attacker’s Playbook”, we will now look at how MITRE ATT&CK® can be...
MITRE
MITRE ATT&CK - The Attackers Playbook
In this introductory article, we will introduce MITRE ATT&CK® and look at how it describes the methods attackers use and the...
On-Demand Webinars
The indiscriminate nature of ransomware in 2022
Watch our latest webinar session and stay current with both insights and knowledge on the cyber controls all organisations should...
Infographics
The Importance of Detection
This infographic gives a simple visualisation of the importance of detection......
Case Studies
Global Leader in Luxury Cosmetics Case Study
Explore why Huntsman SIEM solution was chosen to provide real-time security monitoring for a modern cloud-native global retailer....
MITRE
The MITRE ATT&CK Matrix Compliance Guide
Discover how Huntsman Security’s solutions can specifically assist in supporting the monitoring of your control effectiveness,...
Product Brochures
SmartCheck for Ransomware - Service Providers
Expand your service offering with on or off-premise automated cyber security risk assessment...
Product Brochures
SmartCheck for Ransomware
An automated application that gathers and assesses information from a set of security controls to assess your ransomware...
White Papers
Cyber Security Predictions 2022
Looking forward to the next year in cyber security: insight into how 2022 will impact your organisation's risk exposure....
Tools
Top 10 Questions about Supply Chain Cyber Risk for Executives & Directors
Understanding the business implications of a cyber breach or ransomware attack on a supply chain partner is...
Tools
Top 10 Ransomware Questions for Executives & Directors
Digital risk, including cyber risk, is a pervasive and potentially existential concern. Leaders need to understand and take...
Tools
Top 10 Cyber Security Questions for Executives
Digital risk, including cyber risk, is a pervasive and potentially existential concern. Leaders need to understand and take...
Product Brochures
Enterprise SIEM
Our next generation Enterprise SIEM guards the systems holding your sensitive data, IP, processes, contact and financial...
Product Brochures
MSSP SIEM
Huntsman Security’s SIEM sits at the core of your Security Operations Centre (SOC) as a single, comprehensive, yet flexible...
MITRE
MITRE ATT&CK Framework Implementation Guide
MITRE ATT&CK® stands for Adversarial Tactics, Techniques, and Common Knowledge and the first ATT&CK® Matrix was released in...
Buyers Guide
MSSP SIEM Buyers Guide
Essential Buyers Guide to SIEM For Managed Security Service Providers...
White Papers
Cyber Security Predictions 2021
Looking forward to the next year in cyber security: insight into how 2021 will impact your organisation's risk exposure....
Compliance Guides
Australian Energy Sector Cyber Security Framework Compliance Guide
Discover how to align with the Australian Energy Sector Cyber Security Framework's security profiles....
Tools
5 Ways to Improve Security Assessments
How to easily collect data, assess performance and accurately report on IT security controls...
Compliance Guides
CMMC Compliance Guide
Discover how to fulfil over 80% of CMMC compliance requirements....
Product Videos
Business Intelligence Reporting overview
See how a strong business intelligence interface can support your stakeholders...
MITRE
MITRE ATT&CK Matrix
Discover what the framework is, who it supports and how you can start to build a resilient baseline of security...
Product Videos
Essential 8 Auditor Overview
Gain an immediate, systematic view of security control effectiveness....
Compliance Guides
Cyber Essentials Compliance Guide
Discover how to continuously measure compliance to the five Cyber Essentials controls....
White Papers
Cyber security audit challenges in 2020
Discover the ISACA member participant views on the challenges and how their businesses are responding....
White Papers
Cyber Security Predictions 2020
Looking forward to the next year in cyber security: gain insight into how 2020 may impact your organisation's risk exposure....
Tools
4 Steps to Visible Cyber Hygiene
Minimise security breach fines under GDPR and other international privacy legislation....
White Papers
ACSC Essential 8 Security Controls: The Ninth Step
Discover the critical ninth step to maximise the visibility and measurement of the Essential 8, including vital links to official...
Infographics
Supply Chain Risk Management
This infographic gives a simple visualisation of Supply Chain Risk Management...
Compliance Guides
APRA CPS 234 Compliance Guide
A guide to how Huntsman Security technology supports compliance to APRA CPS 234 July 2019....
Product Brochures
Essential 8 Scorecard
A risk management tool that continuously measures the effectiveness of your security controls....
Compliance Guides
Essential 8 Security Controls Compliance Guide
A guide to how Huntsman Security technology measures your compliance and alignment to the Essential 8 security controls....
Case Studies
Improving Security Control Effectiveness
How an organisation that provides IT services to 9 organisations gained a centralised view of security control effectiveness....
Product Brochures
Essential 8 Auditor
An audit tool that delivers an immediate, exportable view of security control effectiveness....
Case Studies
Developing Managed Security Services
How two organisations developed and grew their managed security services....
Tools
MSP Guide to Building Cyber Security Services
An overview to establishing and growing your cyber security services....
Tools
Cloud Security Service Options for Cloud Service Providers
An introduction to cloud security service options....
Product Videos
Security Scorecard Overview
See how the Essential 8 Scorecard measures security control effectiveness...
Product Brochures
Essential 8 Scorecard Overview
The Essential 8 Scorecard provides continuous measurement of the efficiency and effectiveness of your security controls and...
Product Videos
BAD Short Video
Behaviour Anomaly Detection lets you see unknown threats in real-time...
Product Videos
Next Gen SIEM SOAR short video
Eliminate False Positives and shorten the time from threat detection to resolution...
White Papers
Essential Guide to Data Breach Notifications
One of the most hotly talked about requirements of GDPR is the need to notify the authority within 72 hours of a confirmed breach....
Tools
A Guide to Cyber Security KPIs
An overview of defining, setting and monitoring KPIs for cyber security....
Product Videos
Cyber Risk Measurement – Executive Visibility
See how the Essential 8 Scorecard provides cyber KPIs for managing cyber risk...
Compliance Guides
PSD2 Compliance Guide Overview
This paper gives an overview of The Payment Services Directive 2 (PSD2), the updated version of the original Payment Services...
White Papers
GDPR - What the General Data Protection Regulations mean in Australia
Explore how the conditions of GDPR affect Australian business....
White Papers
GDPR - What the General Data Protection Regulations mean to UK Businesses
Explore the conditions that indicate if GDPR applies to your business and your commitment once a breach is detected....
Tools
Personal Data Breach Mitigation - 4 Step Checklist
Preventative strategies to minimise the number of data breaches including practical examples....
White Papers
Top Cyber Mitigation Strategies
Key Governments' cyber mitigation recommendations to defend your business from cyber attacks....
White Papers
Information Monitoring in Government
Information monitoring in government is a challenge, the public's trust is only as good as the last headline....
White Papers
Cloud Security - Monitoring to the ACSC Essential Eight
Learn how integrating a SIEM platform with a cloud service can help your organisation unmask threats and provide a full security...
White Papers
Analytics and Automation in Cyber Security
Alert volumes are increasing every year. Explore how automation can help reduce routine tasks and identify real threats for your...
Tools
5 Best Practice ISMS Checklists
Benchmark your current ISMS...against our 5 Best Practice ISMS Checklists....
Compliance Guides
Essential Guide to Cyber Security NCSC 10 Steps
Implement the UK's NCSC 10 Steps to Cyber Security with our helpful, structured, progressive plan....
Tools
5 Step Cyber Security Benchmark Tool
Measure your organisation's cyber posture with our 5 Step Cyber Security Benchmark Tool....
Infographics
Business Value of Monitoring
Download our infographic and learn the value of Cyber Security Monitoring to your business....
Compliance Guides
GDPR Security Monitoring Reference Guide
Review the 5 key GDPR articles that apply to security monitoring and access our guidance detailing how to comply....
Compliance Guides
GDPR Security Monitoring Summary
An overview of GDPR cyber security compliance obligations....
Compliance Guides
Fast Track your GDPR Compliance
Are you fulfilling your GDPR obligations? Download the guide for practical examples on what implementing GDPR should look like....
Product Videos
Protective Monitoring
Protective Monitoring...learn why it's important and how to apply it in your organisation....
Product Videos
Cyber Security Incidents and Attacks
This video explains how cyber attacks vary by geography and industry. In just 8 minutes discover the costs of attacks and the...
White Papers
The Cyber Security Malware Crisis is Deepening
Explore the scale of cyber threats businesses face and the technology, people and process aspect of the challenge....
Solution Briefs
MSSP Security using Huntsman
Discover how to scale your security services by using Huntsman SIEM technology to manage multiple customers on a single...
Compliance Guides
PCI DSS Compliance Guide
A step by step Compliance Guide detailing how Huntsman Enterprise SIEM supports PCI DSS regulations, meeting the challenges...
Compliance Guides
GPG13 Compliance Guide OVERVIEW
An overview of how Huntsman SIEM can help your organisation meet its GPG13 obligations and similar protective monitoring...
Compliance Guides
Australian Government ISM Compliance Guide
This compliance guide explains how Huntsman Security solutions map to the requirements of the controls....
Solution Briefs
Threat Intelligence using Huntsman
How to use Huntsman Security's Next Gen SIEM to leverage Threat Intelligence, to improve situational awareness and threat...
Case Studies
Credit Union Case Study
Explore why this this credit union chose Huntsman technology to meet its compliance obligations to PCI-DSS, ISO 27001 and APRA...
Case Studies
Managed Investment Services Case Study
Explore why this investment management services company to some of Australia’s leading life insurers, superannuation providers...
Solution Briefs
Cloud Security using Huntsman
How to use Huntsman to secure Cloud Platforms: Real-time, multi-tenancy support, intelligent monitoring and event processing....
Case Studies
Retail Bank Case Study
How an Australian arm of an international bank used Huntsman to consolidate the security of disparate IT and security systems....
White Papers
Insider Threats: Why behaviour is key to early detection
Insider Threats is one of the greatest security risks to your organisation's information assets. Read more....
White Papers
The Internet Of Things
The Internet of Things (IoT) is a challenge for all of us, at home and in the workplace. Explore the security implications....
Compliance Guides
ISO27001 Compliance Guide
A guide detailing how Huntsman Security technology supports the latest ISO 27001 requirements...
Compliance Guides
FISMA Compliance Guide Overview
An overview of how Huntsman Security supports compliance with NIST SP800-53 (FISMA)....