Infosecurity White Papers
Oracle & KPMG Cloud Threat Report 2018
Oracle and KPMGs annual report highlights how the rapid pace and agility of the cloud has created a strategic imperative for security to keep pace at scale.
The Truth About Cloud Security
Cloud computing has brought new possibilities—and new challenges—to IT teams worldwide.
10 Reasons To Bring All Your Endpoints Under One Roof
Secure, Control, and Consolidate on a Single Platform
State of Cyber Security Report
It is important to determine what is pushing cybersecurity forward, what the future of cybersecurity looks like and whether the industry is healthy and growing at the rate it should be. In this inaugural report, Infosecurity undertook a research project to determine the answers to those questions
A Guide to DDoS Mitigation & Testing: Part 1 - An introduction to DDoS
This whitepaper provides an introduction to the threat of DDoS attacks and the current state of mitigation technologies.
Enterprise Defense at the Speed of Data
Defending today’s global organizations is at the mercy of how quickly and efficiently you can turn data into intelligence and make informed decisions.
5 Things to Consider when Defining Risk Appetite
Here are 5 things to consider to avoid risk.
Payment Services Directive 2 (PSD2): What it is, What it Means & How You Can Use it to Your Advantage
PSD2 (Payment Services Directive 2) can actually be a catalyst for your digital transformation and will provide a more secure, better user experience for your customers.
Black-box Security Assessment
The present document describes the activities performed and the results obtained during the Black-box Security Assessment conducted by CENSUS for an international financial institution.
Aligning to GDPR - The Date is Finally Upon Us, Now What Do We Do?
How an organization can begin to align to GDPR from an unprepared posture with an immature privacy framework.
How to Use Technology to Solve the Skills Shortage
Discover how effective data insight technology can help you reduce the amount of time your security teams spend on the low-value manual operations, and bring your focus back to the areas of most significant return.
Testing Distributed Denial of Service mitigation
This technical paper addresses many of the issues associated with testing a company’s DDoS protection service.
2018 Fundamentals and Best Practices for Linux/UNIX Privileged Identity and Access Management: Guide
PIM, PAM and PUM have different meanings, and interpretations, to different people.
The Evolution of Enterprise Networking and Network Security
Networking and Security for a Bygone Era.
Inside the Mind of a Hacker - How Cybercriminals are Targeting your Business
Criminal hackers work like any other business, as part of commercial - albeit illegal - networks, with clear business models. We have come a long way from the lone hacker stereotype.
Stopping Email Fraud
Today’s email attacks have evolved. Unfortunately, most security tools haven’t evolved with them.
5 Essential Keys to Least Privilege
Protect Data, Users, and Applications with Thoughtful Limitations.
Email Fraud Threat Report
Proofpoint analyzed more than 160 billion emails sent to more than 2,400 companies spanning 150 countries. Here are their findings for 2017.