Infosecurity White Papers

  1. Encryption Mandate: Clear and Present Danger for the Energy Sector

    Imagine what would happen if people no longer had access to safe, reliable electric power, water, telecommunications, gas supply, transportation, or other critical infrastructure systems.

  2. Machine Learning in Cyber Security: Age of the Centaurs

    Artificial intelligence (AI), and in particular machine learning, has taken huge strides and is now set to really start impacting all aspects of industry and society.

  3. Why IT Teams Migrate to Managed File Transfer

    The Growing Challenge: Moving Files to Support Critical Business

  4. Regulatory Compliance Is Always a Smart Investment

    Is it possible to go overboard and encrypt more than necessary? Certainly.

  5. Successful File Server Auditing: Looking Beyond Native Auditing

    File system auditing is no longer simply about the passive auditing of past events.

  6. Uncovering The Real Threats

    How Content Disarm and Reconstruction technology brings cyber-security to life

  7. The DIY Guide to Open Source Vulnerability Management

    Application Vulnerabilities are the #1 Security Threat to Your Organization

  8. Read the Forrester Report: Vulnerability Management 2017

    Why is vulnerability management so difficult?

  9. 7 Steps to Compliance with Data Protection Laws

    How Data Protection Regulations Apply to External File Transfers

  10. Security as a Business Enabler

    How to protect and enable your business through information security

  11. Best Practices for Applying Threat Intelligence

    46% of security professionals expect threat intelligence to be a very important part of their strategy in 2017.

  12. Detecting Ransomware Using File Server Auditing

    Hackers use ransomware to encrypt files on a victim's computer, and then demand money in exchange for the decryption key. Such attacks are becoming increasingly more frequent and sophisticated.

  13. The GDPR & Open Source Security Management

    The EU GDPR mandates that all companies processing and/or holding the personal data of EU residents must protect that information—regardless of where it is sent, processed or stored.

  14. Securing Real-Time Communications for Dummies

    Recent high-profile cyberattacks have many organizations understandably focusing their security efforts on preventing data breaches.

  15. Ransomware - A New Approach to Identifying, Blocking and Real-Time Remediation

    Ransomware attacks targeting companies have escalated 300% since January 2016; attacks are occurring every 40 seconds.

  16. Your Employees Won't Protect You

    Why businesses need an innovation injection to stay safe from cyber threats

  17. 2017 Risk Value Report: Business Security- Always a Journey, Never a Destination

    Download this new Risk:Value Report, commissioned by NTT Security, which highlights concerns and attitudes to security across global organisations; from compliance and cyber insurance to incident response planning.

  18. Encryption in Government: Make the Rules, Play by the Rules

    Few entities possess as much personal information as the U.S. government. In 2015, the Internal Revenue Service processed over 150 million tax returns, and the Social Security Administration paid benefits to nearly 60 million Americans.

  19. Avoiding Privilege Abuse in Active Directory

    It’s inevitable. You’ve given a number of individuals in your organization rights to run around in AD making changes as they see fit, with little oversight. It’s a situation that’s ripe for abuse.

  20. 2017 Open Source Security & Risk Analysis Report

    This analysis was done by Black Duck’s Center for Open Source Research and Innovation (COSRI) and examines findings from the anonymized data of more than 1,000 commercial applications audited in 2016.

What’s hot on Infosecurity Magazine?