Infosecurity White Papers

  1. Virtualization's Hidden Gem: Application Security

    How network virtualization and micro-segmentation can secure your application infrastructure

  2. The Necessity of Software Protection

    Cloakware reports are intended to provide factual, informative descriptions of important topics in cybersecurity, coupled with statistics and perspectives on currently important events and attacks.

  3. The Definitive Guide to Data Loss Prevention

    This comprehensive guide provides what you need to understand, evaluate, and succeed with today's DLP.

  4. Gartner Magic Quadrant Report for Enterprise Information Archiving

    Originally designed for file and email retention, enterprise information archiving (EIA) now incorporates products and solutions for handling a far wider range of user messaging content.

  5. Who Needs Malware?

    How adversaries use fileless attacks to evade your security.

  6. Paradigm Shifts

    Download this whitepaper looking into the current and emerging threats that will make inroads in the 2018 landscape.

  7. Data Governance Implementation Survey 2018

    Over 500 SQL Server professionals participated in the "Data Governance Implementation Survey 2018", with respondents coming from across the globe and representing a wide range of job roles, company sizes, and industries.

  8. Self-healing Cybersecurity for the Digital Era

    Staying ahead of the latest security threats can be a challenge for any organization.

  9. A Collaborative Approach to Compliance

    An in-depth perspective on information security compliance and broader IT GRC programmes, revealing their inherent complexity, their collaborative nature and introducing the principles of ‘collaborative compliance’, which can be leveraged to gain operational efficiencies and costs savings.

  10. Providing Banks and Financial Institutions with Legally Compliant Digital Signatures

    Learn more about legally binding digital signatures based on qualified digital certificates and the benefits they provide to banks and financial institutions

  11. Cyber Intrusion Services Casebook

    Drawn from real-life engagements, this annual casebook provides valuable insights into the evolving tactics, techniques, and procedures used by today’s most sophisticated adversaries.

  12. Quarterly Threat Report

    The Proofpoint Quarterly Threat Report highlights the trends and key takeaways of attacks we see within our large customer base and in the wider threat landscape.

  13. How the Hybrid Cloud Changes the Game for Security

    Examining the dynamics of the hybrid cloud, and the challenges that organizations are facing as they adopt the latest technologies.

  14. Responding to a Data Subject Access Request under the GDPR

    This whitepaper discusses the challenges faced by organizations in complying with a Data Subject Access Request (DSAR) and the impact the General Data Protection Regulation (GDPR) will have in responding to such requests from 25th May 2018.

  15. New Approach to MSSP Security and Profitability

    Despite the vast amounts being spent on today’s state of the art cybersecurity solutions - data breaches are happening at an increasing rate with over 600 detected and reported in the U.S. alone by August 2016, and greater severity with over 20 million exposed records, a 20% increase over record-breaking years 2014 and 2015, according to the ITRC.

  16. The Top 5 Myths of Next-Gen Endpoint Protection

    It can be tough finding the time to pick through the marketing FUD to find the solution that will deliver the best protection. So let’s unpack five common myths associated with next-gen endpoint protection.

  17. Transforming Security Operations with Automation and Analytics

    How do security professionals know that they are looking at the right thing?

  18. 8 Truths About the Threats - and Opportunities - of Employee Passwords

    Learn why passwords are a problem that need to be solved, now.

  19. Managing Enterprise Security and Compliance on SMB Budgets

    An SMB focused perspective on information security compliance, discussing how to balance cost and complexity, the hidden areas that could increase staffing and/or budgetary cost and looks at the key considerations for an SMB focused solution.

  20. Managing Threats, Compliance and Fraud in an Era of Digital Transformation

    New Infrastructure, New Risk Digital transformation is changing the way we work, collaborate and create. The arrival of new flexible platforms, infrastructure and digital channels mean new security, compliance and fraud risks.

What’s hot on Infosecurity Magazine?