Infosecurity White Papers
Prescriptive Guide to Security Reference Architecture
Learn how to develop an overall strategy for security and compliance, including selecting the best security framework for your environment.
Security Configuration Management: Getting Back to IT Security Basics
Cloud Computing. Virtualization. Social Networking. IT Consumerization. What do these trends all have in common?
A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today
These are the top 10 enterprise mobility security threats today
Four Kinds of Password Management
Gartner clients asking about "password management" may have in mind one of four topics covered by Gartner research. Security and risk management leaders responsible for IAM can use this report to identify the research pertinent to their needs.
Ready or Not? GDPR Maturity Across Vertical Industries
Download this whitepaper to find out why GDPR is going to have such a big impact.
How Proactive Prevention Can Eliminate an Unknown Threat
A recent study from the Ponemon Institute stated that over 90% of enterprises have vulnerability backlogs of up to 5,000. An over reliance on detection is not working.
SIEM for Beginners
Everything you wanted to know about log management but were afraid to ask
Open Source Network Security Tools for Beginners
Let’s take a look at a few of the tools available, which will not only provide some answers, but also help you learn more about the topic.
How to Build a Security Operations Center
Whether you’re protecting a bank or the local grocery store, certain common sense security rules apply. At the very least, you need locks on entrances and exits, cash registers and vaults as well as cameras pointed at these places and others throughout the facility.
Why GDPR Is Important and What You Need to Do to Get to Grips With It
Preparedness, technology tools, smart thinking and expert counsel will help you meet the tough challenges of incoming rules on data protection.
Detecting Compromised Credentials with UEBA
All of the biggest data breaches, judged either by number of records breached or the importance of the data stolen, have involved attackers leveraging stolen user credentials to gain access.
Future Focus: Is Your Enterprise Ready for IoT?
A recent study by Juniper Research revealed that by 2020, the number of connected devices will have reached approximately 38.5 billion.
GDPR Handbook
Everything you need to know about the EU General Data Protection Regulation (GDPR) and what do you need to do to comply.
Your Employees Won't Protect You
Businesses need innovation to protect their staff from activating a cyber-attacks.
Social Media a Growing Risk for Corporate Security
Social media is increasingly used by cybercriminals as an attack vector to run scams and carry out malicious attacks.
EMEA: Using Security Metrics to Drive Action
22 experts share how to communicate security program effectiveness to business executives on the board
10 Ways to Secure Your Digital Content
Today, digital security is top-of-mind. In this whitepaper, Limelight discusses ten different ways to protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor.
Applying Data Science to User and Entity Behavior Analytics
This paper discusses the application of data science within a User and Entity Behavior Analytics (UEBA) product to address cyber threats.
Accelerate Incident Response with Threat Intelligence
How Threat Intelligence improves Incident Response: escalate faster, react faster.