Infosecurity White Papers

  1. Incident Response Challenges and Opportunities for European Enterprises

    Organisations globally have come to realise that cybersecurity incidents are inevitable, and more costly than ever. Ninety percent of large businesses suffered a data breach last year, according to PwC research.

  2. 5 Steps to Improve Your Cyber Security Incident Response Plan

    According to Ponemon institute, the average cost of data breach in the U.S. is over $5.4 million. There are a few factors that can positively impact this cost, and having an incident response is one of the most significant ones, with potential to decrease it by 15%.

  3. The Rapid Detection and Response Model (RDRM)

    Best Practices for Accelerating Your Response to Critical Security Incidents.

  4. The Managed File Transfer Buyer’s Guide

    This guide is designed to allow IT Managers to select the right file transfer solution to meet their organizational needs based on their individual requirements.

  5. Modern SSL/TLS Best Practices for Fast, Secure Websites

    What every IT professional should know about SSL security.

  6. Buying into Mobile Security

    An August IDG Research Services survey set out to glean insights into the mobile security investment risks. It was conducted among 100 IT leaders and IT security executives (49 percent of whom were CIOs).

  7. Website Security Statistics Report 2015

    This invaluable report provides information about the most prevalent vulnerabilities, how many get fixed, the average time to fix them, and provides recommendations for measurably improving application security programs.

  8. 8 Issues Derailing IT Team Innovation

    What are the key challenges facing IT teams that can keep mission critical applications and infrastructure from running at full speed?

  9. Looking Forward and Looking Back: Lookout's Cybersecurity Predictions

    Instead of assessing what the next 365 days will bring, we are going to look forward with a three year rolling window.

  10. Preparing for the General Data Protection Regulation

    Data protection laws across the EU are out of date and barely fit for purpose. Additionally, each member state has its own regime, creating a nightmare of compliance for businesses in the middle of the second decade of the 21st century.

  11. Micro-Segmentation Builds Security Into Your Data Center’s DNA

    Traditional network security systems have a major flaw: Once malware gets into the data center, it can move unhindered from workload to workload, wreaking havoc before it can be stopped. Micro-segmentation changes all that.

  12. For the EU’s New Data Protection Regulation, Encryption Should be the Default

    This document discusses the changes being made to the European data protection landscape and suggests that encryption should be the default choice for protecting data. However, this should just be part of the overall data security strategy, which must be comprehensive and consistent.

  13. Key Management Compliance - Explained

    Cryptographic key management is an umbrella term which refers to the various administration processes that govern the life cycle of keys andthe keys’ associated crypto material and metadata.

  14. Securing Endpoints Against The Next Generation of Attacks

    In today’s ‘always on, always connected’ world where sensitive data is almost certain to be stored electronically, organisations can no longer afford to operate without some form of Endpoint Protection. What does 2016 have in store for us?

  15. Transforming Email Security: Insights with Forrester & Aetna

    In the wake of high-profile email phishing attacks, heightened concerns around digital identity fraud have raised consumer expectations around the promise of your brand.

  16. Anticipating Cyber Attacks: There’s No Abbottabad in Cyber Space

    Download this white paper explaining how to track the data trail of threats, attackers, methods, and operations before they execute attacks.

  17. Point-of-Sale System Breaches: Threats to the Retail and Hospitality Industries

    From a security perspective, the most immediate risk to businesses and customers lies in accepting payments. The information customers hand over, if captured, can be used by cybercriminals to commit credit card fraud.

  18. What CISOs Need to Know About The New NIST: Guidelines for Secure Shell

    On August 20, 2014, The Computer Security Division of The National Institute of Standards and Technology (NIST) released Interagency Report 7966 (NISTIR 7966).

  19. Best Practices for Migrating to Office 365

    Many organizations are seriously considering the deployment of Microsoft Office 365 and Exchange Online. The result is that the penetration of Office 365 is expected to more than double by 2017, primarily at the expense of on-premises Exchange.

  20. Evolving Threats Call For Integrated Endpoint Security Solutions With Holistic Visibility

    High-profile breaches of personal data at retailers, government agencies, health care companies, and other entities make the news with frightening regularity.

What’s hot on Infosecurity Magazine?