Infosecurity White Papers
Beyond Next-gen: Defining Future-ready Endpoint Security
Notable next-gen cybersecurity products include next-gen firewalls, the state of the art of which now represents the standard, current-generation firewall technology.
Producing a World-Class Threat Intelligence Capability
This paper focuses on critical concepts and practical details, where necessary, to produce a world-class threat intelligence capability from scratch.
How You Can Use the Dark Web for Threat Intelligence
See how combining information from the dark web with technical and open sources can reveal valuable threat intelligence.
The True Cost of Ransomware
5 Companies, 5 Attacks, and the Reality of Recovery
Providing a Better Cyber Security Assessment
As an advisory services provider, if you want to differentiate yourself from your competitors, moving to an automated data collection process will take your cyber security assessment services from good to great.
Before and After Next-gen: Cybersecurity Considerations that Transcend Paradigm Shifts
There is no question that it is an exciting time for information technology, but concurrent shifts warrant a strategic perspective with respect to cybersecurity.
Secure Email Messaging in Office 365: Four Key Considerations
Download this whitepaper to learn the four issues that are highly important when considering email security functionality in O365.
Detection of Denial of Service Attacks in Modern Cloud Environments
Due to local data processing laws and security policies, companies are often unable to use public cloud resources.
Leveled-Up Value Recognition for Shared Security Services
What Challenges Do Managed Security Service Providers Face?
Evolving Threats Call For Integrated Endpoint Security Solutions With Holistic Visibility
High-profile, targeted attacks from malicious actors now occur with frightening and increasing regularity.
Is Data Security in Financial Services Simply a Box-Ticking Exercise?
A four step guide to protecting your organization’s reputation and your customers’ data
How to Build a Skilled IT Security Team in 5 Steps
In an era of APT and sophisticated attacks, how do you make sure that your IT Security team and your organization have the right skills to protect your most critical assets? This paper focuses on the steps every organization should take to minimize cyber security risk for the coming years.
Preparing your Organization for the Inevitable HIPAA Audit
A four step guide to protecting your organization’s reputation and your customers’ data
Educational Institutions at High Risk for Costly Data Breaches
The Ponemon Institute estimates that on average, organizations of all types face a 26% probability of a data breach involving 10,000 or more lost or stolen records – and educational institutions are increasingly becoming targets.
2017 Study on Mobile and IoT Application Security
Ponemon Institute is pleased to present the findings of the 2017 Study on Mobile and Internet of Things Application Security sponsored by IBM and Arxan Technologies.
The Right Prescription for Maintaining Compliance with Patient Security Regulations
In the healthcare industry, expensive equipment is usually a point of pride, but one leading provider never intended to pay $1.5 million each for two laptops.
Using Indicators To Deal With Security Attacks
Understand the unique capabilities of indicators of compromise and attack, the differences between them, and the steps to configure a SIEM solution to detect IoCs and IoAs.
Ransomware: What's the Cost to Business?
The steps organisations should take to mitigate the risk of ransomware attack
Best Practices for Securing Privileged Access
Read this whitepaper to learn best practices for processes, policies and technology used to secure access to privileged accounts and other elevated privileges.