Infosecurity White Papers

  1. Winnti: More than Just Windows and Gates

    While reviewing a 2015 report of a Winnti intrusion at a Vietnamese gaming company, Chronicle identified a small cluster of Winnti samples designed specifically for Linux. This white paper is a technical analysis of this variant.

  2. A New Vision for Phishing Defense: Inbox Detection and Response

    To enhance security in the face of evolving phishing threats, organizations need to move from a gateway-based single-pass inspection model to a new layered security model that includes continuous email monitoring and detection. Read this white paper to find out how!

  3. 2020 Application Security Observability Report

    This white paper provides a comprehensive guide for organisations in transforming their businesses through digital innovation while ensuring application security.

  4. Cyber-Threat Report - The Phishing Issue

    This white paper explores recent trends in phishing, provides insight into the latest tactics phishers are using to evade detection and outlines why some industries are more at risk than others.

  5. COVID-19 Online Traffic and Attack Data Report

    In this white paper, we will consider what is different, both in terms of traffic in general and in cyber-attacks specifically.

  6. Appsec For The Newly Hired CISO/CSO

    This white paper explores the first 100 days of the new CISO/CSO’s tenure specifically from the perspective of AppSec.

  7. Hacked Off: A Study of Global Infosec Professionals

    This white paper shines a light on the current state of play of the global cybersecurity landscape

  8. Catching the Phish that Got Away: Adaptive Security to Block Evasive Phishing Attacks

    Read this whitepaper to learn why corporate email in the cloud remains highly vulnerable to cyber-threats & how IDR addresses these vulnerabilities,

  9. The Risk Management Blind Spot, Third-Party Identities Often Create Unrecognised Risk

    This white paper explores and outlines why, to effectively manage third-party risk, organizations require a purpose-built, scalable solution that improves the granularity,

  10. The Indelible Impact of Covid-19 On Cybersecurity

    COVID-19 has presented infosec professionals with the opportunity to reassess their infrastructure and refocus on what end users/employees really need and want, in terms of cybersecurity support.

  11. A New Approach to Secure Mobile Banking Apps

    In this white paper, you will learn the what’s necessary to build a comprehensive app protection strategy.

  12. Succeeding at the Intersection of Security and Privacy

    This white paper explores the benefits of such a strategy focused on the nexus of security and privacy and outlines the importance of exploring this growing convergence and the underlying forces behind the privacy and security awakening.

  13. In Plain Sight: The Vulnerability Epidemic in Mobile Financial Apps

    Read this whitepaper to learn of common app vulnerabilities found in mobile financial apps and the sensitive information they can reveal

  14. Data Security and Privacy in the Digital Workplace

    Read this white paper to learn how the right technology can help you ensure data privacy and security in today’s digital workplace

  15. The Ultimate Guide to AWS, Azure and GCP Cloud Asset Visibility

    This white paper outlines a revolutionary new approach to cloud asset visibility and security, exploring the pros and cons of conventional cloud approaches and includes a comprehensive solutions comparison matrix.

  16. Secure Managed File Transfer Ultimate Buyers Guide

    Read this whitepaper to have a better grasp on what secure managed file transfer can do for your organisation. We’ve also included a helpful, printable checklist to use when comparing solutions from different managed file transfer vendors.

  17. Infosecurity Magazine's State of Cybersecurity Report 2020

    Welcome to the third annual Infosecurity Magazine State of Cybersecurity Report. This research presents and outlines the most influential security trends affecting the industry as a whole and compares the trends most influential within different sectors.

  18. A Technical Look into Maze Ransomware

    This white paper outlines how to defeat the evasion techniques built into the MAZE ransomware. Key takeaways:

  19. Five Ways to Maximize the Security, Performance and Reliability of Your Online Business

    Read this white paper to learn the key considerations for delivering a secure and seamless user experience.

  20. The What, How and Why of Zero Trust Cybersecurity

    Read this white paper to learn the what, how and why of Zero Trust cybersecurity – along with gaining an understanding of how to implement an effective Zero Trust strategy for your organisation.

What’s hot on Infosecurity Magazine?