Infosecurity White Papers

  1. Strategy for a Successful Micro-Segmentation Journey

    Learn about the common obstacles to successful micro-segmentation and how to avoid them and effectively use micro-segmentation to help protect mission-critical applications and workloads.

  2. Cybersecurity Intelligence Report

    Download this report now and see where you are on the security continuum!

  3. Legal Team's Role in Investigating & Responding to a Data Breach

    This whitepaper outlines the critical role of in-house legal in helping organizations effectively collaborate to manage post-breach investigations and minimize the damage – from the initial identification and investigation, through reporting findings and learning from the incident.

  4. Ten Must-Have Features of a Modern SIEM

    This white paper presents ten must-have features of an innovative and effective SIEM capable of handling evolving threats.

  5. Five Reasons Why You Need a Cloud-Native Web Application Firewall

    The best way to protect your business from harmful incoming web traffic is to block it with a powerful web application firewall (WAF).

  6. Red Teaming: How to Identify Gaps in Your Security Strategy by Thinking Like the Enemy

    This guide explains what red teaming is, how to get the most from it and the business benefits it brings.

  7. Best Practices for GDPR & CCPA Compliance

    AccessData has worked with Osterman Research to conduct an in-depth survey of North American organizations with regard to their plans for GDPR and CCPA compliance. This whitepaper provides an overview of the survey findings.

  8. Ponemon Report: Trends in the Cost of Web Application & Denial of Service Attacks

    The purpose of this research is to understand changes in the cost and consequences of web application and denial of service attacks.

  9. PAM - A Key Element in ISO 27001 Compliance

    This white paper looks at sections of the standard that apply directly and indirectly to PAM, using the example of the WALLIX Bastion to highlight how a PAM solution can help companies achieve the ISO 27001 certification.

  10. Anatomy of a Cyber-Attack

    How does an organization “protect” themselves from a breach? In this whitepaper, learn how to determine network health before proceeding with advisory engagements.

  11. Navigating a Security Wasteland

    In this whitepaper, Cybrary discusses how “managing your enterprise security organization like a small business” is pivotal when it comes to application & cloud security.

  12. Security Threats: Is That a Trojan in Your Pocket?

    The popularity, portability and precarious security mobile devices an attractive target for cybercriminals. It is time to get serious about mobile security. Start with a corporate mobility policy to define your mobile security strategy, and deploy an EMM solution to make it happen.

  13. C-Suite IT Execs Call for Federal Privacy Rules

    Companies in the US are meeting new security and privacy regulations head on and they’re ready for more. When it arrives, though, they’d like more clarity.

  14. The Gamer Theory of Threat Hunting

    Gamify your threat hunting experience! Many organizations are shifting to iterative threat hunting exercises based around intelligence operations. This paper outlines gamified threat hunting levels, and key concepts ‘hunt gamers’ should focus on.

  15. Deteque Threat Report 2018

    Deteque is a division of Spamhaus and integrated with a global network of service providers and a community of researchers who have been dedicated to combating DNS abuse since 2008. Each year the research team at Spamhaus’ Malware Labs publishes its findings and this Report builds on the threat landscape of 2017 with latest figures from 2018 to date.

  16. Building Your Bullet Proof Incident Response Plan

    This whitepaper looks at the current state of corporate cyber security when even the largest organizations are often overwhelmed by the volume of flagged incidents and unknown files that need to be investigated. Meanwhile, businesses’ and customers’ sensitive information is at risk of being compromised by the needle in the haystack: the major threat hiding in plain sight among false positives.

  17. Stopping Data Exfiltration and Malware Spread Through DNS

    Recent research from IDC predicts worldwide spending on security-related hardware, software, and services will reach $119.9 billion in 2021.

  18. A Fresh Look at Security Analytics

    Most enterprises are at least discussing security analytics. But how are they actually deploying these tools? And with what levels of automation and orchestration?

  19. Investing in Cyber Insurance: the What, the Why and the How

    Just as the expectations that a business will experience a cyber incident are increasing, so too are the costs of recovering from those breaches. As of 2018, the global average cost of a data breach is $3.6 million, or about $141 per stolen data record.

  20. A Practical Guide To Outsourcing Your Service Desk

    For businesses new to outsourcing their services, outsourcing the service desk functionality can be an easy first step.

What’s hot on Infosecurity Magazine?