Infosecurity White Papers
Download and engage with the latest White Papers focused on Information Security strategy, technology & insight. Each White Paper is editorially approved to ensure the research presented is up to date, high quality and relevant to personal development or workplace implementation.
The Digital Operational Resilience Act (DORA): A Comprehensive Guide to TPRM Compliance
Risk Ledger has teamed up with Evelyn Partners to produce a comprehensive white paper on DORA’s third-party risk management implications
Maintaining a Fit-For-Purpose Cybersecurity Strategy: How to Comply with Australian Privacy Act Changes, Increase Alignment with Essential Eight
How to comply with Australian Privacy Act changes, increase alignment with Essential Eight while improving cyber security posture
Gcore Radar: DDoS Attack Trends Q3 to Q4, 2023
As we enter 2024, we’re pleased to present the latest Gcore radar report, a twice-annual publication in which we release internal analytics to track DDoS attacks. Our broad, internationally distributed network of scrubbing centers allows us to follow attack trends over time. DDoS attack trends for the second half of 2023 reveal alarming developments in the scale and sophistication of cyberthreats. Notable changes to the DDoS landscape were the doubling of peak attack power into the mid-Tbps range, the targeting of specific industries with tailored strategies, and the globalization of attack resources.
Healthcare Cloud Security Build vs. Buy
Healthcare organizations face both challenges and opportunities as data management increasingly migrates to the cloud, and in-house IT teams must determine whether engaging with a healthcare cybersecurity vendor is the right choice for handling some or all their operations. In this white paper, we help you uncover strategies and best practices that can empower your organization to thrive in this era of technological transformation and heightened security concerns.
A CISO's Guide to Post-Quantum Cryptography Migration
Find out what decision-makers can do today to begin building a quantum-resilient organization
Corporates Up Their Cyber Preparedness As Cyber Attacks Become More Widespread
Given the extent of business disruption arising from some recent cyber events, the financial impact is becoming more meaningful
5 Ways to Strengthen Your Active Directory Password Policy
A comprehensive guide to securing your first line of defense against cyber-attacks.
Enhancing Information Security Resilience with the New ISO/IEC 27001 Standard
The ISO/IEC 27001 international information security standard was updated in 2022, reflecting major changes to business practices
Reduce downtime in ICS & OT from days and weeks to minutes
This white paper presents an innovative solution for cyber- attacks on critical assets minimizing downtime and reducing the recovery process from days and weeks to minutes!
Logpoint Emerging Threats Report: Russia v Ukraine. Round 2 Gamma Edition
Discover how this cyber war has evolved since February 2022 and how Logpoint’s solutions and playbooks can help to prepare for, and respond to, an increase in Gamaredon malware.
The New Standard in Cyber-Attack Recovery for ICS & OT
In an increasingly interconnected world, critical infrastructures such as power grids, transportation networks, and water treatment facilities have become attractive targets for cybercriminals. Advanced Persistent Threats (APTs) have emerged as a significant threat, capable of causing extensive damage and disruption. Since cyber-attacks have become inevitable, mitigation is a must; This white paper presents an innovative solution for cyber- attacks on critical assets.
Managed File Transfer for Enterprise: The Buyer’s Guide
Info-Tech’s Data Quadrant Reports provide a comprehensive evaluation of popular products in the Managed File Transfer - Enterprise market. This buyer’s guide is designed to help prospective purchasers make better decisions by leveraging the experiences of real users.
Three Ways to Spot Insider Risk
The biggest challenge to spotting a threat is knowing what to look for.
How to Choose a File Upload Security Solution for Web Applications
Discover key strategies to fortify web applications against malicious file uploads with this comprehensive guide.
Last Line of Defense Against Ransomware
Ransomware is everywhere, and it’s not slowing down – read about what should strategically be in place to ensure that your data is full protected.
The Difference Between Insider Risk and Insider Threat
Threats and risks, they both sound dangerous, but they are not the same, and companies who manage risk effectively can minimize threats.
Businesses Need Managed File Transfer
Compared to using a variety of standalone FTP and SFTP tools, MFT technology allows professionals to streamline how data is transferred. This helps organizations do things like send and receive files in their cloud and private networks, create and control workflows, and automate transfers.