Infosecurity White Papers

  1. Beyond Next-gen: Defining Future-ready Endpoint Security

    Notable next-gen cybersecurity products include next-gen firewalls, the state of the art of which now represents the standard, current-generation firewall technology.

  2. Producing a World-Class Threat Intelligence Capability

    This paper focuses on critical concepts and practical details, where necessary, to produce a world-class threat intelligence capability from scratch.

  3. How You Can Use the Dark Web for Threat Intelligence

    See how combining information from the dark web with technical and open sources can reveal valuable threat intelligence.

  4. The True Cost of Ransomware

    5 Companies, 5 Attacks, and the Reality of Recovery

  5. Providing a Better Cyber Security Assessment

    As an advisory services provider, if you want to differentiate yourself from your competitors, moving to an automated data collection process will take your cyber security assessment services from good to great.

  6. Before and After Next-gen: Cybersecurity Considerations that Transcend Paradigm Shifts

    There is no question that it is an exciting time for information technology, but concurrent shifts warrant a strategic perspective with respect to cybersecurity.

  7. Secure Email Messaging in Office 365: Four Key Considerations

    Download this whitepaper to learn the four issues that are highly important when considering email security functionality in O365.

  8. Detection of Denial of Service Attacks in Modern Cloud Environments

    Due to local data processing laws and security policies, companies are often unable to use public cloud resources.

  9. Leveled-Up Value Recognition for Shared Security Services

    What Challenges Do Managed Security Service Providers Face?

  10. Evolving Threats Call For Integrated Endpoint Security Solutions With Holistic Visibility

    High-profile, targeted attacks from malicious actors now occur with frightening and increasing regularity.

  11. Is Data Security in Financial Services Simply a Box-Ticking Exercise?

    A four step guide to protecting your organization’s reputation and your customers’ data

  12. How to Build a Skilled IT Security Team in 5 Steps

    In an era of APT and sophisticated attacks, how do you make sure that your IT Security team and your organization have the right skills to protect your most critical assets? This paper focuses on the steps every organization should take to minimize cyber security risk for the coming years.

  13. Preparing your Organization for the Inevitable HIPAA Audit

    A four step guide to protecting your organization’s reputation and your customers’ data

  14. Educational Institutions at High Risk for Costly Data Breaches

    The Ponemon Institute estimates that on average, organizations of all types face a 26% probability of a data breach involving 10,000 or more lost or stolen records – and educational institutions are increasingly becoming targets.

  15. 2017 Study on Mobile and IoT Application Security

    Ponemon Institute is pleased to present the findings of the 2017 Study on Mobile and Internet of Things Application Security sponsored by IBM and Arxan Technologies.

  16. The Right Prescription for Maintaining Compliance with Patient Security Regulations

    In the healthcare industry, expensive equipment is usually a point of pride, but one leading provider never intended to pay $1.5 million each for two laptops.

  17. Insider Threats to Financial Services

    Uncover evidence with external intelligence

  18. Using Indicators To Deal With Security Attacks

    Understand the unique capabilities of indicators of compromise and attack, the differences between them, and the steps to configure a SIEM solution to detect IoCs and IoAs.

  19. Ransomware: What's the Cost to Business?

    The steps organisations should take to mitigate the risk of ransomware attack

  20. Best Practices for Securing Privileged Access

    Read this whitepaper to learn best practices for processes, policies and technology used to secure access to privileged accounts and other elevated privileges.

What’s hot on Infosecurity Magazine?