Infosecurity White Papers

  1. Security Challenges in Migrating to 100Gb Network

    As data traffic continues to evolve and increase, Network Engineers and Network Architects need to migrate their data to an upgraded network that can support 40Gb or 100Gb speeds.

  2. Next-Gen Approaches to Attack Remediation

    Enterprise Management Associates (EMA) analysts take on packet-based security forensics and strategies to ID and remediate attacks.

  3. Practical Steps to Address EU General Data Protection Regulation Compliance (GDPR)

    Practical Steps to Address EU General Data Protection Regulation Compliance

  4. EU Data Protection Reform

    Background and insight into GDPR. What it means for business.

  5. How Threat Intelligence Quantifies Risk for the Business

    It can be argued that cyber threat intelligence (CTI) is most valuable to a business when it continuously informs a quantitative risk assessment model that contains specific probabilities for loss from a specific threat type.

  6. Pentesting - The Required Human Ingenuity to Uncover Security Gaps

    How is a pentest different from a vulnerability assessment?

  7. Top 3 Drivers for Accelerating Application Deployment with Automation

    Understand why many IT organizations are now taking steps to virtualize the network and fully automate the provisioning of complete application stacks.

  8. IT Automation: What it Means and Why it Matters Now

    A Gartner, Inc. survey found that 59 percent of surveyed IT professionals believe their IT organizations are unprepared for the digital business of the next two years.

  9. Five Important Requirements for Next Generation IPS

    While attackers continue to innovate, traditional intrusion prevention systems (IPS) have stood still, generating low-value alerts for security teams as attackers slip past in pursuit of high-value targets.

  10. Web Applications Security Statistics Report 2016

    Download the 2016 Website Statistics report to gain unparalleled insight into website security.

  11. Network History: The Missing Piece in the Cybersecurity Puzzle

    The what, why and how of improving cybersecurity by recording network history

  12. Protecting Against Hackers Inside

    Recently disclosed high-profile hacks against the Democratic National Committee, the New York Times and Yahoo! have drawn increased attention on attempts by outside malicious actors to disrupt crucial business processes.

  13. ESG Report: Securing the Shifting Network Perimeter

    Learn about five “…must-have requirements of an SDP solution for today’s and tomorrow’s compute environments”

  14. Stopping the Approved Outsider

    Transform Vendor Risk Management to Improve Security

  15. GDPR Checklist: 11 Step Plan for the Incoming Regulation

    Have you started your preparations for the GDPR (General Data Protection Regulation)?

  16. The Hunted Becomes the Hunter

    How Real-Time Threat Intelligence From the Web Helps Protect Your Brand and Data.

  17. Is Data Security in Financial Services Simply a Box-Ticking Exercise?

    A four step guide to protecting your organization’s reputation and your customers’ data.

  18. Preparing your Organization for the Inevitable HIPAA Audit

    A four step guide to protecting your organization’s reputation and your customers’ data

  19. #IMCUS Slides: Effectively Connecting with Your Future Talent: Understanding the Profile of the New Cybersecurity Specialist

    The complete slide deck from the recent session on understanding the profile of the new cybersecurity specialist as presented at Infosecurity Magazine Conference in Boston.

  20. #IMCUS Slides: Winning the Cybersecurity Talent War – How to Successfully Attract, Recruit And Retain Top Talent

    The complete slide deck from the recent session on hot to successfully attract, recruit and retain talent as presented at Infosecurity Magazine Conference in Boston.

What’s hot on Infosecurity Magazine?