Infosecurity White Papers

  1. Who is GOSSIPGIRL: Revisiting the Threat Actor Supergroup

    This whitepaper investigates the connection between Flame and the O.G. threat actor super group GOSSIPGIRL.

  2. Say 'Yes' to Bring-Your-Own-Apps

    Read this whitepaper to learn how to manage BYOA securely and effectively

  3. Getting Identity Access Right: A Balancing Act

    This guide will help you learn how Identity Governance and Administration (IGA) can Combat risks

  4. How to Master Mobile Access and Ensure Security

    What to consider when adding mobile devices in your access control infrastructure?

  5. Five Enterprise Attack Vectors You Can Protect with MFA

    5 most common ways in which hackers can obtain credentials or gain unauthorized access.

  6. Know Your Enemy. Know Your Risk

    This report gets inside the mind of a hacker, analyzing their motivations and methods for penetrating cyber-defenses, and outlines the most effective ways to reduce your risk.

  7. Harness the Benefits of Unified Physical & Logical Control Access

    As high-profile data breaches grab headlines across the globe, many organizations are shifting their attention to external cyber-threats. While these external threats are very real, confronting internal vulnerabilities is one of the most effective ways of preventing attacks in the first place. Converging physical and logical access is one way to reduce risk.

  8. How to Master IAM: Seven Key Steps

    This eBook addresses seven of the most common IAM fears and how you can overcome them.

  9. Managing the Risk of Post-Breach or "Resident" Attacks: A Ponemon Institute Study

    Download the report to learn the primary obstacles to better threat detection and incident response.

  10. The Benefits of Managed Detection Services

    This report provides an expert perspective on how UK businesses must consider risk and regulatory issues when shaping protection requirements

  11. Agile Security Manifesto

    The Agile Manifesto was created in 2001 to provide an alternative to document-heavy software development practices.

  12. The Convergence of Physical Access Control and IT in the Enterprise

    This whitepaper summarizes the details discovered in this research and provides actionable insights that will increase collaboration between IT and Physical Security.

  13. Remedying the Email Security Gaps in Microsoft Office 365

    Why should you consider additional security protection around Microsoft Office 365TM email use? Furthermore, what should you look for in a third-party solution?

  14. Mastering MFA: Combining Security with Usability, at a Lower Cost

    Read this whitepaper to learn how MFA can strengthen your security posture while also lowering your costs and ensuring a better user experience.

  15. Cloud Threat Report 2019

    This report summarizes 11 case studies of cloud-based attacks, including spear phishing, insider threat and zero-day malware.

  16. Common Use Cases for Attack Surface Manager

    This whitepaper provides an overview of common ways that Illusive’s customers are using Attack Surface Manager, including fortifying PAM/PIM solutions, detecting insider threats and malicious insider activity and providing powerful, automated Red Team functions.

  17. Data Breach Survey 2019

    The results of the research can offer insights that could help to inform the allocation of security budgets and strategies so that investment can be directed to where it will achieve the greatest impact in preventing costly data breaches.

  18. The Vulnerable Landscape: Metrics, Insights and Impact for Security Leaders

    You’re racing the clock to patch the riskiest vulnerabilities before attackers exploit them

  19. State of Cybersecurity Report 2019

    An exclusive report by Infosecurity Magazine. Discover the trends that are driving the information security industry forward in 2019.

What’s hot on Infosecurity Magazine?