Infosecurity White Papers

  1. Prescriptive Guide to Security Reference Architecture

    Learn how to develop an overall strategy for security and compliance, including selecting the best security framework for your environment.

  2. Security Configuration Management: Getting Back to IT Security Basics

    Cloud Computing. Virtualization. Social Networking. IT Consumerization. What do these trends all have in common?

  3. A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today

    These are the top 10 enterprise mobility security threats today

  4. Four Kinds of Password Management

    Gartner clients asking about "password management" may have in mind one of four topics covered by Gartner research. Security and risk management leaders responsible for IAM can use this report to identify the research pertinent to their needs.

  5. Ready or Not? GDPR Maturity Across Vertical Industries

    Download this whitepaper to find out why GDPR is going to have such a big impact.

  6. How Proactive Prevention Can Eliminate an Unknown Threat

    A recent study from the Ponemon Institute stated that over 90% of enterprises have vulnerability backlogs of up to 5,000. An over reliance on detection is not working.

  7. SIEM for Beginners

    Everything you wanted to know about log management but were afraid to ask

  8. Open Source Network Security Tools for Beginners

    Let’s take a look at a few of the tools available, which will not only provide some answers, but also help you learn more about the topic.

  9. Finding a Password Manager for Your Business

    A guide to evaluating and comparing solutions.

  10. How to Build a Security Operations Center

    Whether you’re protecting a bank or the local grocery store, certain common sense security rules apply. At the very least, you need locks on entrances and exits, cash registers and vaults as well as cameras pointed at these places and others throughout the facility.

  11. Why GDPR Is Important and What You Need to Do to Get to Grips With It

    Preparedness, technology tools, smart thinking and expert counsel will help you meet the tough challenges of incoming rules on data protection.

  12. Detecting Compromised Credentials with UEBA

    All of the biggest data breaches, judged either by number of records breached or the importance of the data stolen, have involved attackers leveraging stolen user credentials to gain access.

  13. Future Focus: Is Your Enterprise Ready for IoT?

    A recent study by Juniper Research revealed that by 2020, the number of connected devices will have reached approximately 38.5 billion.

  14. GDPR Handbook

    Everything you need to know about the EU General Data Protection Regulation (GDPR) and what do you need to do to comply.

  15. Your Employees Won't Protect You

    Businesses need innovation to protect their staff from activating a cyber-attacks.

  16. Social Media a Growing Risk for Corporate Security

    Social media is increasingly used by cybercriminals as an attack vector to run scams and carry out malicious attacks.

  17. EMEA: Using Security Metrics to Drive Action

    22 experts share how to communicate security program effectiveness to business executives on the board

  18. 10 Ways to Secure Your Digital Content

    Today, digital security is top-of-mind. In this whitepaper, Limelight discusses ten different ways to protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor.

  19. Applying Data Science to User and Entity Behavior Analytics

    This paper discusses the application of data science within a User and Entity Behavior Analytics (UEBA) product to address cyber threats.

  20. Accelerate Incident Response with Threat Intelligence

    How Threat Intelligence improves Incident Response: escalate faster, react faster.

What’s hot on Infosecurity Magazine?