Infosecurity White Papers

  1. Enabling Email Security in the Finance Services Sector

    Its taken decades for the leading financial services firms to establish trusted relationships with their customers – but that trust can be shattered in seconds with the click of a fraudulent email.

  2. Accurate Visibility of Security Data

    Do you want to be able to answer questions like these quickly and with confidence?

  3. Gartner Research and Trend Micro Resources Help You Understand the Benefits of “Connected Threat Defense”

    While many security vendors claim to have “the silver bullet” to solve all your security problems, the reality is that no single layer of security will protect against all the threats you face.

  4. Zero Trust Requires Effective Business-Centric Application Segmentation

    In August 2015, Certes Networks commissioned Forrester Consulting to evaluate current application and network segmentation strategies in the wake of increasingly sophisticated attack methods.

  5. The Fundamentals of Email Phishing

    The UK consumer association Which? found that people receive, on average, up to 20 phishing emails a month, but how do we identify fraudulent emails and prevent phishing attacks

  6. Preventing Data Loss Through Privileged Access Channels

    A basic tenet of security is to apply the strongest safeguards to the highest value targets.

  7. Reduce Downtime, Increase Your Returns

    Working out the potential return on investment on a new server or application is relatively straightforward – if it enables you to do more in less time, profits are likely to go up, making it worth buying.

  8. Don’t Let a Breach Destroy Your Customers’ Trust

    43% of companies experienced a data breach last year - do you have a breach communication plan in place?

  9. 49% of the FT 500 Europe are at Risk for a Cyber-Attack

    Recorded Future analysis identified recent employee credential exposures for at least 49% of the FT 500 Europe, putting each company at risk for a cyber attack

  10. The New Mindset for Building Secure Services in the Cloud

    Cloud computing is reshaping not only the technology landscape, but the very way companies think about and execute their innovation process and practices.

  11. Insider Threats: How to Spot them and How to Stop them

    More than one-third of all cybercrime incidents and security breaches are caused by insiders.

  12. Has SIEM Lost Its Magic? Top five reasons why SIEMs are failing security professionals

    SIEM solutions have been around since 2000, and they were developed with the goal of helping organizations in the early detection of targeted attacks and data breaches. But are they working? Are they delivering enough value? Have they lost their magic?

  13. Website Security Statistics Report 2015

    WhiteHat Security’s Website Security Statistics Report provides a one-of-a-kind perspective on the state of website security and the issues that organizations must address in order to conduct business online safely

  14. Quick Start Guide to Ethical Hacking

    In this Guide to Ethical Hacking, Matt Ford of Foursys sets out the definition, goals and processes involved in the use of ethical hacking.

  15. Cashing in with a Secure Software Defined Data Centre

    This technology spotlight discusses how to seamlessly integrate different vendor technologies solutions and unlock the full potential of the software-defined data centre.

  16. Banishing Explicit Content by Redefining the Secure Web Gateway

    Porn; love it or pretend it’s something you once saw by accident at a friend’s house, was at one stage both the undisputed king and at the same time, utter scourge of the Internet.

  17. 2015 Data Protection Maturity Report

    This survey on data protection maturity highlights the threats, responses, policies, and technologies of a shifting data security landscape. It also reveals how organizations have made progress—and where they may still be at risk.

  18. Gain More Effective and Efficient Endpoint Security

    The volume and sophistication of malware is skyrocketing, and traditional anti-virus approaches are struggling to keep up.

  19. Insider Threat Report: European Edition

    European organisations are lagging behind US counterparts in terms of dealing with data security.

  20. 451 Research: Vormetric Encryption Gateway and Platform Strategy

    This report offers a current analysis of Vormetric's recent product releases, including the solutions offering tokenization with dynamic data masking, Teradata support, and cloud encryption gateway.

What’s hot on Infosecurity Magazine?