Infosecurity White Papers
Taking a Positive Approach to Developer Security
How to make secure code training and tools simple, relevant and engaging
Tackling Insider Threat with Data Loss Protection
This report describes how to build an insider threat program.
Responding to Security Questionnaires
Why vendor security questionnaires aren't going away, and what the impact will be on your team
Mastering Mainframe Maintenance
Download this whitepaper to learn how mainframe computers can be handled efficiently.
Why Privileged Access Can Work at Scale and Better Defend You
This whitepaper explores why organizations need better privileged access management (PAM) and how they can master defense at scale.
How Deception Efforts can Bolster Your Security Posture
This report covers and assessed CDS and the market positions of 18 vendors delivering products and services for CDS. The report includes relative vendor value and value spotlight charts, market size and forecast and segment futures for CDS.
Why Multi Party Losses are Greater than Single Incidents
This whitepaper analyzes independent data gathered on over 800 multi-party cyber-incidents observed over the last decade.
How to Get Healthcare Identity Governance Right
Read this whitepaper to learn the key issues and trends within the healthcare industry that warrant the need for effective identity governance
Deceive to Achieve: The Key to Deception-Based Alerts
Download this whitepaper to explore the three key questions that need answers when you suspect a breach
The State of Email Security Report
This whitepaper investigates the most pervasive types of email threats, how security professionals perceive them and what they’re doing to combat them.
Know Your Role: Mastering Privileged Access Management
This whitepaper explores the challenges organizations face with privileged access management (PAM), the tools and methods used to manage privileged access and the effectiveness of PAM solutions.
Cloud Risk Surface Report
How security findings differ among cloud providers
Mimecast Threat Intelligence Report: Black Hat Edition
The Mimecast Threat Intelligence Report: Black Hat Edition presents research conducted April-June 2019, reinforcing a previously observed trend: malware-centric campaigns
Deception 2.0 for Dummies
Cybersecurity breaches are active on enterprise networks for an average of 200 days before they’re discovered. Once inside your network, attackers pivot to other systems and networks, stealing valuable and sensitive data with impunity.
GDPR for Third Party Risk Management
This whitepaper details considerations organization need to account for when it comes to meeting Europe’s privacy regulations.
State of the Web Report 2019
The State of the Web Report 2019 is designed to educate enterprises about the significant and under-recognized security challenges related to their web assets.
Security by Design: How to Reduce the Attack Surface
Studies show one in 10 adults have been a victim of cybercrime. Download this whitepaper to find out more about becoming secure by design.
How to Create a Secure, More Efficient and Compliant Workplace
Increase safety with data-powered emergency response and crisis management
IT Director's Guide to Passwords and Cyber Essentials
This whitepaper explains the role of password policy and password security in achieving Cyber Essentials accreditation. Learn the five best practices for being Cyber Essentials certified
2019 Cloud Security Report
The 2019 Cloud Security Report highlights what is and what is not working for security operations teams in securing their cloud data, systems and services in this shared responsibility model.