Infosecurity White Papers

  1. Blind Trust Is Not A Security Strategy - Lessons From Cloud Adopters

    An Enterprise Management Associates® (EMA™) white paper prepared for iland

  2. 2016 State of Data Security and Compliance Report

    Ipswitch and Vanson-Bourne polled 555 IT team members who work in companies across the globe with greater than 500 employees, between October-November 2015 to learn about their file transfer habits and goals.

  3. How to Comply with the New European Data Protection Laws

    The GDPR will come into force in May 2018. Organisations have until then to review their processes and security strategies in order to comply with it.

  4. Building Resilient Cloud Network Architectures

    This paper builds on our recent Pragmatic Security for Cloud and Hybrid Networks research, focusing on cloud-native network architectures that provide security and availability infeasible in a traditional data center.

  5. The Rise of the Cloud Security Professional

    This white paper looks at the relationship between IT and the C-suite, and the role of CCSPs as key players on the strategic forefront of a company’s life.

  6. Detection & Analysis of Dridex with CyberShield AnD for IT

    Dridex has been one of most notable threats since its appearance in late 2014 and throughout 2015. A strain of malware evolving from the infamous Zeus family, it is designed to steal personal banking information and credentials.

  7. Not all Certificate Authorities are Created Equal

    There have been a string of successful attacks on certificate authorities (CAs) this year, and the threat to CAs will certainly not abate.

  8. Webinar Report:The Five Stages of Insider Threat

    Much has been made of the insider threat faced by organisations this year and many vendors are hooked on the message of fixing the problem with technologies but the issue requires a lot more thought than that.

  9. Resilient Systems and the Rise of the Incident Response Platforms

    Maintaining a discipline of strong cybersecurity has become increasingly difficult at enterprise organizations for several reasons.

  10. Questions that I am Most Frequently Asked by New Buyers of SSL Certificates

    If you are new to the SSL certificate market, I am sure that you will have at least one of these questions as well.

  11. How Trust Really Affects Online Shoppers’ Decision to Buy

    Trust is essential, but just how well are website owners doing at building trust with their potential online customers?

  12. 5 Ways of Empowering your Incident Response Team

    How should incident response teams work to mitigate and respond to your network’s cyber threats and incidents?

  13. Six Golden Rules for Selecting an SSL or TLS Certificate

    The foundation of trusted Internet communications are Secure Socket Link (SSL) certificates, an encryption technology installed on Web servers that permits transmission of sensitive data through an encrypted connection.

  14. Website Security Threat Report 2015

    The Symantec Website Security Threat Report gives enterprises, small businesses, and consumers essential information to secure their systems effectively now and into the future.

  15. Website Security for Dummies

    Download this guide for helpful information on the importance of website security, tips to establish a web security program, and designing, creating and building a safe, secure website.

  16. Simple Steps to a Secure Website in 2016

    384 million identities were exposed in 2014 as a result of data breaches. That’s equivalent to the whole population of Western Europe.

  17. Hidden Dangers Lurking in E-Commerce- Reducing Fraud with the Right SSL Certificate

    Research from Norton estimates the global price tag of consumer cybercrime now topping some US$113 billion annually which is enough to host the 2012 London Olympics nearly 10 times over.

  18. The Cyber Resilient Organisation in the United Kingdom: Learning to Thrive against Threats

    Are businesses ready today to face cyber threats head on? To find out, Ponemon Institute surveyed 450 IT and IT security practitioners in the United Kingdom about their organisations’ approach to becoming resilient to security threats. The findings are presented in this study.

  19. CloudFlare Advanced DDoS protection

    Although DoS attacks are not a recent phenomenon, the methods and resources available to conduct and mask such attacks have dramatically evolved to include distributed (DDoS) and, more recently, distributed reflector (DRDoS) attacks—attacks that simply cannot be addressed by traditional on-premise solutions.

What’s hot on Infosecurity Magazine?