Infosecurity White Papers

  1. Talk Metadata to Me: How to Decode Your Network's Deepest and Darkest Secrets

    Understand the value of rich, historical metadata and why it's vital for stopping attacks on the network.

  2. Top 3 Requirements to Turbocharge your Forensics

    Eliminate limitations and complexities within security investigations and make everyone on the team an expert analyst.

  3. Data Loss Prevention as a Critical Component of Cyber Insurance Strategy

    Uncover the types of internal threats that North American organizations need to be aware of.

  4. 50 Shades of Dark: How to Use the Dark Web for Threat Intelligence

    There's a lot of talk about the dark web these days, including how cyber criminals use it to spread malware, leak intellectual property, and publish user account credentials.

  5. Exposing the Unknown: How Sandboxing Technology Fights Modern Threats

    Learn how to better protect your business assets and deepen your understanding of the threat landscape with this white paper.

  6. Stop DDoS Attacks with Advanced, Effective Protection

    Stop DDoS Attacks with Advanced, Effective Protection

  7. Intelligent Systems in Action: The Rise of the Machines has Already Begun

    How important is it for your business to exploit intelligent systems to compete effectively in your market(s) over the coming three years? Read this report based on a recent survey of 521 senior IT pros.

  8. Countering Insider Threats in eDiscovery

    When it comes to your data, if it’s valuable, it’s vulnerable. Is your organisation prepared?

  9. More threats. Fewer experts. There’s a Growing Skills Gap. How will you Manage?

    There's a growing skills gap in IT security skills. So what are your options? Is it really an option to do nothing at all?

  10. Shutting the Door on the Attacker

    Case study lessons learned from the front lines to explain why it is important to understand what type of incident you are dealing with.

  11. 5 Failing Tools and Security Trends

    What are the five security tools we will continue to use — but offer decreasing levels of security

  12. The Definitive Guide to Managed File Transfer

    The Growing Challenge: Moving Files to Support Critical Business. How important is all this? The boom in file transfer activities, and the cost of getting it wrong, makes it very important.

  13. Introduction to PCI and PII: Securing your Organizations Data

    A must-read white paper for IT, Legal, and C-Level Professionals

  14. Social Media a Growing Risk for Corporate Security

    Unless companies come to realise that their security perimeters must grow beyond the corporate firewall to encompass social media networks and other areas such as the Dark Web, then the global cost of cyber crime will continue to mushroom.

  15. Making Sure Employees Are Not Your Weakest Link

    Despite the effort governance, compliance and security functions put into managing information security, employees often remain the weakest link in an organisation’s defence.

  16. 2016 Vormetric Data Threat Report

    This special version of the 2016 data threat report is targeted to the European market.

  17. The Medical Device Paradox

    In 2015, the world witnessed the compromise of drug infusion pumps via the cyberattack of hospital networks, where remote hackers altered the drugs being pumped into patients, putting them into potentially life-threatening situations.

  18. Securing Modern Data Centers and Clouds

    Attackers require only one success to gain entrance to the entire data center; a breach is typically “game over.”

  19. Optimizing Web Application Security for the New Bad Bot Threat Landscape

    In relation to online fraud, both bots and humans can generate transaction fraud and chargebacks.

What’s hot on Infosecurity Magazine?