Infosecurity White Papers

  1. Windows Server 2003 End-of-Support: How to Securely Extend Service Life

    Microsoft withdraws support for Windows Server 2003 on July 14, 2015. Here’s how you need to respond to protect your organization’s information assets.

  2. 2015 Insider Threat Report: Healthcare Edition

    The 2015 Vormetric Insider Threat Report - Healthcare Edition - offers trends and future directions in Data Security.

  3. Calculating the Business Value of Disaster Recovery

    An ineffective DR plan can mean the difference between being seen as a hero to the C-suite, or finding yourself in a job interview.

  4. 2015 Insider Threat Report: Retail Edition

    This report provides trends and future directions in data security that can help retail IT security make their tough decisions.

  5. Ovum Decision Matrix: Selecting an Enterprise Backup and Recovery Solution

    This report provides a side-by-side comparison of leading enterprise backup and recovery solutions, looking at the ability to deliver a holistic backup and recovery strategy.

  6. 2015 State of the Endpoint Report: User-Centric Risk

    This annual study is conducted by Ponemon Institute to understand trends and changes in endpoint risk in organizations.

  7. Addressing Transformation in Enterprise Security

    Enterprise security is becoming more difficult on an annual basis. ESG recommends organizations move beyond SIEM alone and develop advanced skills and expertise for threat detection and response.

  8. Security First: Clarity on PCI Compliance

    Get clarity on the much misunderstood PCI DSS standard with our white paper. We explain the requirements, dispel the myths and give you top tips on how to save your business time and effort.

  9. 5 Ways to Save Time and Money on Your Data Backups – and Impress Your Boss Too

    This short e-book will highlight five key approaches that can not only help you save time managing backups, but control costs too.

  10. Redefining Your Data Protection Strategy: Focus on Recovery

    In response to increasing user expectations on access to and availability of data, IT infrastructure needs to evolve, particularly for data protection.

  11. BYOD, is the big bad wolf dead?

    Bring your own device (BYOD) became the universally accepted hall pass for ‘Let’s sidestep the policies we once insisted were important.

  12. How to Make the Right File Transfer Choices

    Stagnate or Automate? It’s a familiar question for IT, and is a matter of asking: Do you keep doing things the way you’ve been doing them—making do with “good enough” file transfer systems for example—or do you consider automating technologies and processes that have been performed manually up till now?

  13. Cybersecurity – You’re Already Compromised

    Corporate spending on IT security reached a record $71 billion in 2014. This represents an 8% increase over 2013, and it’s predicted to increase another 8% in 2015.

  14. Managed file transfer for Dummies

    Moving data securely and reliably to support critical business processes has never been more important — and challenging.

  15. Infosecurity Europe Industry Survey - Executive Summary

    How can organisations build resilience and balance prevention and response?

  16. The WTF: Where's the file E-Guide

    How to always know where files are at all times, and whether you’re ready to eliminate manual tasks and custom scripting once and for all

  17. Secure Pipes: Changing the Expectation of Your Internet Service Providers

    The reality of today’s Internet is that cyber threats are becoming increasingly more sophisticated. Advanced Persistent threats (APT), botnets, zero-day attacks, and countless malware variants have caused significant monetary damage on a global scale. Essentially, APTs are the result of lessons learned from cyber nation-state attacks such as GhostNet and Stuxnet.

  18. Top 10 Database Threats

    Practical applications for Big Data have become widespread, and Big Data has now become the new "prize" for hackers.

  19. Top 10 DDoS Attack Trends

    DDoS attacks are constantly evolving, both in terms of size as well as sophistication. This paper outlines the top 10 DDoS attack trends.

  20. The Cloud App Visibility Blindspot

    This white paper covers the significant blindspot in visibility and increased risks for organizations in the face of “Shadow IT”.

What’s hot on Infosecurity Magazine?