Infosecurity White Papers

  1. 2020 Vulnerability Stats Report

    This white paper, Edgescan’s 2020 Vulnerability Stats Report, measures the current state of full-stack security, based on tens of thousands of global assessments.

  2. A Beginner's Guide to Access Security

    This white paper forms a comprehensive beginner’s guide for anyone looking to understand the basics of access security.

  3. Coronavirus Report: Popular Android Apps Impersonated by Malware

    This whitepaper expands on several highly popular applications that cyber-criminals are using to compromise devices, as well as the potential impact on the victim.

  4. Identity Gap in Third-Party Risk Management

    Read this whitepaper to learn what is required to effectively manage and reduce third party risks, to increase efficiency and eliminate over-provisioning

  5. 10 Ways to Secure and Accelerate a Modern Workforce

    Read this white paper to learn how you can safeguard sensitive data and block malicious content, without slowing your employees and your IT team down.

  6. Future of Authentication Report 2020

    Infosecurity Magazine is proud to have collaborated on this Future of Authentication Report 2020 with Raconteur, working with researchers and industry experts to examine the authentication landscape.

  7. E-Book: Data Loss Prevention - Protect Information and Reduce Data Breach Risks

    In an ever-connected and data-reliant world, information security risks are aplenty. It’s never been more important for organizations to ensure their data security strategies are effective, productive and well-aligned.

  8. The Business Case for Internet Isolation

    In this whitepaper, we delve into the benefits of web isolation and provide an analysis on the true hidden costs of failed web security approaches.

  9. The Guide to Your Organisations Biggest Threat Vectors

    This white paper explores why CSOs need to understand the varying kinds of data breaches that can come both from within and without their own organizations.

  10. 2019 Year in Review: Cyber-Threats and Trends Report

    2019 Year in Review: Cyber-Threats and Trends Report New exploits and increased relevance of Distributed Denial of Service (DDoS) attacks The number of DDoS attacks increased 180% in 2019. Are you prepared for 2020?

  11. Is SaaS the New Trojan Horse in the Age of Cloud Computing?

    This whitepaper looks at how users are no longer chained to their desks or the data center to conduct work. Resulting in a company’s attack surface now being unlimited and ubiquitous.

  12. Internet Security Report - Q4 2019

    This report prepares businesses, service providers and end users with the data, trends, research and best practices they need to defend against today’s security threats.

  13. Definitive Guide to Internet Isolation

    Read this whitepaper to learn how internet isolation can revolutionize security to eliminate the risk of phishing attacks and malware-infected endpoints for secure cloud transformation.

  14. Zero Trust Security Internet is the Answer

    In this whitepaper, learn the benefits of implementing a zero trust internet approach to your email and web security

  15. Third-Party Cyber Risk: 8 Key Considerations

    This Whitepaper looks at why third-party security risk matters, some of the forces transforming this space, and how to prioritise risk.

  16. A Guide to Mastering Managed File Transfer

    Read this whitepaper now to learn the steps you should take to select the right file transfer solution to meet your organizational needs.

  17. Third-Party Risk Management Playbook

    What impact a Ripple Event could have on your organization.

  18. Risk-Based Vulnerability Management: Focus on the Vulnerabilities That Pose the Greatest Risk

    Find out why CVSS fails as a prioritization tool – and why it’s imperative to consider business context, including vulnerability data, threat intelligence and asset criticality

  19. Coders Conquer Security: Your Battle Plan to Defeat the OWASP Top 10

    This whitepaper is your ultimate, fully-interactive guide to understanding each infamous entry in the OWASP Top 10, gaining insight into how each bug operates.

  20. Employees Quit. Data Leaves.

    This report presents a life-like scenario depicting how and why a departing member of staff can prove to be a significant security threat

What’s hot on Infosecurity Magazine?