Infosecurity White Papers

  1. Oracle & KPMG Cloud Threat Report 2018

    Oracle and KPMGs annual report highlights how the rapid pace and agility of the cloud has created a strategic imperative for security to keep pace at scale.

  2. The Truth About Cloud Security

    Cloud computing has brought new possibilities—and new challenges—to IT teams worldwide.

  3. 10 Reasons To Bring All Your Endpoints Under One Roof

    Secure, Control, and Consolidate on a Single Platform

  4. State of Cyber Security Report

    It is important to determine what is pushing cybersecurity forward, what the future of cybersecurity looks like and whether the industry is healthy and growing at the rate it should be. In this inaugural report, Infosecurity undertook a research project to determine the answers to those questions

  5. A Guide to DDoS Mitigation & Testing: Part 1 - An introduction to DDoS

    This whitepaper provides an introduction to the threat of DDoS attacks and the current state of mitigation technologies.

  6. Enterprise Defense at the Speed of Data

    Defending today’s global organizations is at the mercy of how quickly and efficiently you can turn data into intelligence and make informed decisions.

  7. 5 Things to Consider when Defining Risk Appetite

    Here are 5 things to consider to avoid risk.

  8. Payment Services Directive 2 (PSD2): What it is, What it Means & How You Can Use it to Your Advantage

    PSD2 (Payment Services Directive 2) can actually be a catalyst for your digital transformation and will provide a more secure, better user experience for your customers.

  9. Black-box Security Assessment

    The present document describes the activities performed and the results obtained during the Black-box Security Assessment conducted by CENSUS for an international financial institution.

  10. Aligning to GDPR - The Date is Finally Upon Us, Now What Do We Do?

    How an organization can begin to align to GDPR from an unprepared posture with an immature privacy framework.

  11. How to Use Technology to Solve the Skills Shortage

    Discover how effective data insight technology can help you reduce the amount of time your security teams spend on the low-value manual operations, and bring your focus back to the areas of most significant return.

  12. Testing Distributed Denial of Service mitigation

    This technical paper addresses many of the issues associated with testing a company’s DDoS protection service.

  13. 2018 Fundamentals and Best Practices for Linux/UNIX Privileged Identity and Access Management: Guide

    PIM, PAM and PUM have different meanings, and interpretations, to different people.

  14. The Evolution of Enterprise Networking and Network Security

    Networking and Security for a Bygone Era.

  15. Inside the Mind of a Hacker - How Cybercriminals are Targeting your Business

    Criminal hackers work like any other business, as part of commercial - albeit illegal - networks, with clear business models. We have come a long way from the lone hacker stereotype.

  16. Enough of the Noise: Let's Embrace GDPR

    Why is GDPR a change for good?

  17. Stopping Email Fraud

    Today’s email attacks have evolved. Unfortunately, most security tools haven’t evolved with them.

  18. Are You Ready to Respond?

    Evaluate and Improve Your Ability to Respond to the Next Attack.

  19. 5 Essential Keys to Least Privilege

    Protect Data, Users, and Applications with Thoughtful Limitations.

  20. Email Fraud Threat Report

    Proofpoint analyzed more than 160 billion emails sent to more than 2,400 companies spanning 150 countries. Here are their findings for 2017.

What’s hot on Infosecurity Magazine?