Infosecurity White Papers
Encryption Mandate: Clear and Present Danger for the Energy Sector
Imagine what would happen if people no longer had access to safe, reliable electric power, water, telecommunications, gas supply, transportation, or other critical infrastructure systems.
Machine Learning in Cyber Security: Age of the Centaurs
Artificial intelligence (AI), and in particular machine learning, has taken huge strides and is now set to really start impacting all aspects of industry and society.
Why IT Teams Migrate to Managed File Transfer
The Growing Challenge: Moving Files to Support Critical Business
Regulatory Compliance Is Always a Smart Investment
Is it possible to go overboard and encrypt more than necessary? Certainly.
Successful File Server Auditing: Looking Beyond Native Auditing
File system auditing is no longer simply about the passive auditing of past events.
Uncovering The Real Threats
How Content Disarm and Reconstruction technology brings cyber-security to life
The DIY Guide to Open Source Vulnerability Management
Application Vulnerabilities are the #1 Security Threat to Your Organization
Read the Forrester Report: Vulnerability Management 2017
Why is vulnerability management so difficult?
7 Steps to Compliance with Data Protection Laws
How Data Protection Regulations Apply to External File Transfers
Security as a Business Enabler
How to protect and enable your business through information security
Best Practices for Applying Threat Intelligence
46% of security professionals expect threat intelligence to be a very important part of their strategy in 2017.
Detecting Ransomware Using File Server Auditing
Hackers use ransomware to encrypt files on a victim's computer, and then demand money in exchange for the decryption key. Such attacks are becoming increasingly more frequent and sophisticated.
The GDPR & Open Source Security Management
The EU GDPR mandates that all companies processing and/or holding the personal data of EU residents must protect that information—regardless of where it is sent, processed or stored.
Securing Real-Time Communications for Dummies
Recent high-profile cyberattacks have many organizations understandably focusing their security efforts on preventing data breaches.
Ransomware - A New Approach to Identifying, Blocking and Real-Time Remediation
Ransomware attacks targeting companies have escalated 300% since January 2016; attacks are occurring every 40 seconds.
Your Employees Won't Protect You
Why businesses need an innovation injection to stay safe from cyber threats
2017 Risk Value Report: Business Security- Always a Journey, Never a Destination
Download this new Risk:Value Report, commissioned by NTT Security, which highlights concerns and attitudes to security across global organisations; from compliance and cyber insurance to incident response planning.
Encryption in Government: Make the Rules, Play by the Rules
Few entities possess as much personal information as the U.S. government. In 2015, the Internal Revenue Service processed over 150 million tax returns, and the Social Security Administration paid benefits to nearly 60 million Americans.
Avoiding Privilege Abuse in Active Directory
It’s inevitable. You’ve given a number of individuals in your organization rights to run around in AD making changes as they see fit, with little oversight. It’s a situation that’s ripe for abuse.
2017 Open Source Security & Risk Analysis Report
This analysis was done by Black Duck’s Center for Open Source Research and Innovation (COSRI) and examines findings from the anonymized data of more than 1,000 commercial applications audited in 2016.