Infosecurity White Papers
Winnti: More than Just Windows and Gates
While reviewing a 2015 report of a Winnti intrusion at a Vietnamese gaming company, Chronicle identified a small cluster of Winnti samples designed specifically for Linux. This white paper is a technical analysis of this variant.
A New Vision for Phishing Defense: Inbox Detection and Response
To enhance security in the face of evolving phishing threats, organizations need to move from a gateway-based single-pass inspection model to a new layered security model that includes continuous email monitoring and detection. Read this white paper to find out how!
2020 Application Security Observability Report
This white paper provides a comprehensive guide for organisations in transforming their businesses through digital innovation while ensuring application security.
Cyber-Threat Report - The Phishing Issue
This white paper explores recent trends in phishing, provides insight into the latest tactics phishers are using to evade detection and outlines why some industries are more at risk than others.
COVID-19 Online Traffic and Attack Data Report
In this white paper, we will consider what is different, both in terms of traffic in general and in cyber-attacks specifically.
Appsec For The Newly Hired CISO/CSO
This white paper explores the first 100 days of the new CISO/CSO’s tenure specifically from the perspective of AppSec.
Hacked Off: A Study of Global Infosec Professionals
This white paper shines a light on the current state of play of the global cybersecurity landscape
Catching the Phish that Got Away: Adaptive Security to Block Evasive Phishing Attacks
Read this whitepaper to learn why corporate email in the cloud remains highly vulnerable to cyber-threats & how IDR addresses these vulnerabilities,
The Risk Management Blind Spot, Third-Party Identities Often Create Unrecognised Risk
This white paper explores and outlines why, to effectively manage third-party risk, organizations require a purpose-built, scalable solution that improves the granularity,
The Indelible Impact of Covid-19 On Cybersecurity
COVID-19 has presented infosec professionals with the opportunity to reassess their infrastructure and refocus on what end users/employees really need and want, in terms of cybersecurity support.
A New Approach to Secure Mobile Banking Apps
In this white paper, you will learn the what’s necessary to build a comprehensive app protection strategy.
Succeeding at the Intersection of Security and Privacy
This white paper explores the benefits of such a strategy focused on the nexus of security and privacy and outlines the importance of exploring this growing convergence and the underlying forces behind the privacy and security awakening.
In Plain Sight: The Vulnerability Epidemic in Mobile Financial Apps
Read this whitepaper to learn of common app vulnerabilities found in mobile financial apps and the sensitive information they can reveal
Data Security and Privacy in the Digital Workplace
Read this white paper to learn how the right technology can help you ensure data privacy and security in today’s digital workplace
The Ultimate Guide to AWS, Azure and GCP Cloud Asset Visibility
This white paper outlines a revolutionary new approach to cloud asset visibility and security, exploring the pros and cons of conventional cloud approaches and includes a comprehensive solutions comparison matrix.
Secure Managed File Transfer Ultimate Buyers Guide
Read this whitepaper to have a better grasp on what secure managed file transfer can do for your organisation. We’ve also included a helpful, printable checklist to use when comparing solutions from different managed file transfer vendors.
Infosecurity Magazine's State of Cybersecurity Report 2020
Welcome to the third annual Infosecurity Magazine State of Cybersecurity Report. This research presents and outlines the most influential security trends affecting the industry as a whole and compares the trends most influential within different sectors.
A Technical Look into Maze Ransomware
This white paper outlines how to defeat the evasion techniques built into the MAZE ransomware. Key takeaways:
Five Ways to Maximize the Security, Performance and Reliability of Your Online Business
Read this white paper to learn the key considerations for delivering a secure and seamless user experience.
The What, How and Why of Zero Trust Cybersecurity
Read this white paper to learn the what, how and why of Zero Trust cybersecurity – along with gaining an understanding of how to implement an effective Zero Trust strategy for your organisation.