Infosecurity White Papers

  1. Taking a Positive Approach to Developer Security

    How to make secure code training and tools simple, relevant and engaging

  2. Tackling Insider Threat with Data Loss Protection

    This report describes how to build an insider threat program.

  3. Responding to Security Questionnaires

    Why vendor security questionnaires aren't going away, and what the impact will be on your team

  4. Mastering Mainframe Maintenance

    Download this whitepaper to learn how mainframe computers can be handled efficiently.

  5. Why Privileged Access Can Work at Scale and Better Defend You

    This whitepaper explores why organizations need better privileged access management (PAM) and how they can master defense at scale.

  6. How Deception Efforts can Bolster Your Security Posture

    This report covers and assessed CDS and the market positions of 18 vendors delivering products and services for CDS. The report includes relative vendor value and value spotlight charts, market size and forecast and segment futures for CDS.

  7. Why Multi Party Losses are Greater than Single Incidents

    This whitepaper analyzes independent data gathered on over 800 multi-party cyber-incidents observed over the last decade.

  8. How to Get Healthcare Identity Governance Right

    Read this whitepaper to learn the key issues and trends within the healthcare industry that warrant the need for effective identity governance

  9. Deceive to Achieve: The Key to Deception-Based Alerts

    Download this whitepaper to explore the three key questions that need answers when you suspect a breach

  10. The State of Email Security Report

    This whitepaper investigates the most pervasive types of email threats, how security professionals perceive them and what they’re doing to combat them.

  11. Know Your Role: Mastering Privileged Access Management

    This whitepaper explores the challenges organizations face with privileged access management (PAM), the tools and methods used to manage privileged access and the effectiveness of PAM solutions.

  12. Cloud Risk Surface Report

    How security findings differ among cloud providers

  13. Mimecast Threat Intelligence Report: Black Hat Edition

    The Mimecast Threat Intelligence Report: Black Hat Edition presents research conducted April-June 2019, reinforcing a previously observed trend: malware-centric campaigns

  14. Deception 2.0 for Dummies

    Cybersecurity breaches are active on enterprise networks for an average of 200 days before they’re discovered. Once inside your network, attackers pivot to other systems and networks, stealing valuable and sensitive data with impunity.

  15. GDPR for Third Party Risk Management

    This whitepaper details considerations organization need to account for when it comes to meeting Europe’s privacy regulations.

  16. State of the Web Report 2019

    The State of the Web Report 2019 is designed to educate enterprises about the significant and under-recognized security challenges related to their web assets.

  17. Security by Design: How to Reduce the Attack Surface

    Studies show one in 10 adults have been a victim of cybercrime. Download this whitepaper to find out more about becoming secure by design.

  18. How to Create a Secure, More Efficient and Compliant Workplace

    Increase safety with data-powered emergency response and crisis management

  19. IT Director's Guide to Passwords and Cyber Essentials

    This whitepaper explains the role of password policy and password security in achieving Cyber Essentials accreditation. Learn the five best practices for being Cyber Essentials certified

  20. 2019 Cloud Security Report

    The 2019 Cloud Security Report highlights what is and what is not working for security operations teams in securing their cloud data, systems and services in this shared responsibility model.

What’s hot on Infosecurity Magazine?