Infosecurity White Papers
#IMCUS Slides - Securing the User: Winning Hearts & Minds to Drive Cyber Secure Behavior
The complete slide deck from the recent session on securing the user as presented at Infosecurity Magazine Conference in Boston.
#IMCUS Slides: Securing Smart City Technology Adoption: Managing Privacy & Cyber Risk
The complete slide deck from the recent session on securing smart city technology adoption as presented at Infosecurity Magazine Conference in Boston.
IMCUS Slides: Articulating Risk to Senior Management: Enabling Informed Decision-Making
The complete slide deck from the recent session on articulating risk to senior management as presented at Infosecurity Magazine Conference in Boston.
#IMCUS Slides: Keeping up with Next-Generation of Cyber Risks: Securing the Connected Car
The complete slide deck from the recent session on securing the connected car as presented at Infosecurity Magazine Conference in Boston.
#IMCUS Slides: Implementing a Dynamic Security Strategy to Support Business Innovation & Digital Transformation
The complete slide deck from the recent session on dynamic security strategy as presented at Infosecurity Magazine Conference in Boston.
#IMCUS Slides: Deploying Dynamic User Access Controls
The complete slide deck from the recent session on the software defined perimeter as presented at Infosecurity Magazine Conference in Boston.
How to Produce a World-Class Threat Intelligence Capability
Discover the six core competencies that comprise a successful threat intelligence program.
CISSP® Planning Kit
CISSP Planning Kit: Your Guide to CISSP Certification and Beyond. Studying for the CISSP exam can seem overwhelming, which is why (ISC)2 developed this quick guide. Download this planning kit for a CISSP overview, study tips, preview of how to maintain your certification, and more!
Preparing for the GDPR: DPOs, PIAs, and Data Mapping
With the General Data Protection Regulation coming online in the European Union by May 2018 — by its own terms affecting organizations worldwide that collect or process EU citizens’ personal data — we have an opportunity to test how ready privacy professionals are for a contemporary and comprehensive privacy regulation that makes obligatory many of the last decade’s “privacy-on-the-ground” practices.
Enterprise Mobile: The New Threat Vector
Why Employee Mobile Devices Are Undermining Your Enterprise Security Efforts
Security Configuration Management for Dummies
If you're in charge of securing your organization's network, reducing its attack surface, or maintaining and proving compliance with regulations, this book is for you.
Secure Email Messaging in Office 365: Four key considerations
Organisations worldwide are moving to Microsoft Office 365 for hosted email services, and for good reason.
Understand Your Attacker: A Practical Guide to Identifying TTPs With Threat Intelligence
Combat threats by understanding your adversaries and the tools, techniques, and processes (TTPs) they're likely to weaponize.
13 Steps to Meeting the Security Challenges of the New EU GDPR
Once in force, the European Union General Data Protection Regulation (GDPR) will require every multinational company that offers products or services to European Union residents to adhere to a strict set of data privacy and security measures.
Threat Hunting, Shadow IT and Other Bold New Frontiers
The company continues to move beyond the vulnerability management realm, enabling threat hunting and ‘shadow IT’ discovery use cases via a mix of its sensor options: agent scanning, passive listening, traditional scanning and log analysis.
4 Fallacies around Security Breaches to Consider for 2017 Budget
The Cyber security landscape changes quickly and planning your 2017 investment strategy may be something you are iterating right now.
5 Signs You Need a Mobile Security Game Plan
Mobile security is on everyone's to do list, but when do you know it’s time for your enterprise to have a mobile security game plan? Appthority tackles that question in its latest eBook, 5 Signs You Need a Mobile Security Game Plan.
Cyber Security and Packet Capture: Making the Connection
What makes cyberattacks so tricky is that there isn’t a traditional, physical crime scene where evidence can be collected for investigation.
The Last Security Tool
In 2014, average costs for data breaches rose (USD 5.9 million, up from to USD 5.4 million), lost business (USD 3.2 million, up from USD 3.03), and lost or stolen records (USD 246 per).
Federal Contractors Face New Cyber Security Standards – Here’s How to Prepare
Prepare Your Organization Now For Updated Federal Security Standards That May Affect Your Organization’s Federal Contracts