Infosecurity White Papers

  1. CVE Publishing: A Race to Protect against Dark Web Threat Actors Trying to Exploit

    Although the practice of alerting the public with new CVEs (Critical Vulnerabilities and Exposures) is a crucial component in contemporary cyber-security strategy, Dark Web threat actors are actively searching for new vulnerabilities and investing considerable effort in finding ways to exploit them before organizations can protect themselves.

  2. The Complete Guide on Open Source Security

    The ins and outs of open source security in one comprehensive guide.

  3. The Untapped Potential of Malware Classification

    Choosing function and convenience over online privacy and security may come at a price.

  4. Corporate Data: the More You Have, the Greater the Risk

    What You Need to Know to Protect Corporate Data Throughout its Lifecycle

  5. CISO's Guide to Compliance

    Quickly Meet Regulatory Compliance and Improve Security with PAM.

  6. A Modern Identity for the Modern Consumer

    Learn how one trusted identity can transform the banking experience.

  7. A New Angle on Cybersecurity

    New threats demand new approaches. An expert point of view from BlackBerry Cybersecurity Consulting

  8. Threat Intel: Why More Doesn’t Mean Better Security

    Busting the myth that more threat intel feeds lead to better security.

  9. Five Must Ask DNS Questions

    Learn the five things to ask yourself as you consider a DNS security solution for your company.

  10. The Software Security Risk Manager

    Learn how to identify, communicate and manage security risks through the implementation of threat modeling.

  11. Top Tips for Digital Transformation in the Public Sector

    An evolving landscape means the Public Sector needs to be more security-ready than ever.

  12. The Top 5 Threats to Enterprise File Security

    Take a deeper look at the file security threats – both internal and external – facing modern businesses

  13. CEO Fraud Prevention Manual

    CEO fraud is responsible for over $3 billion in losses. Don’t be next.

  14. Securing Mobile Files: The Six Tools You Need

    Learn how to securely provide your users with the six tools they need to handle mobile files

  15. Securing Web Applications

    Web application security is much more than an IT problem. It can become a significant business problem if not handled properly.

  16. The 2018 Threat Impact and Endpoint Protection Report

    In 2017, Ransomware was a multi-billion dollar business, seeing the number of new ransomware variants continually grow quarter over quarter.

  17. Preparing for a Breach - Steps to Creating an Effective Incident Response Plan

    Steps to creating an effective incident response plan

  18. How Can You Establish Your Risk Appetite?

    Learn the 5 key points to consider when establishing your level of acceptable cybersecurity risk

  19. Assessing the risk of DDoS to a UK Business

    Read this guide to learn the five common steps to a risk assessment for DDoS and understand the hazard associated with DDoS attacks.

What’s hot on Infosecurity Magazine?