Infosecurity White Papers

  1. 2014 Symantec Internet Security Report

    Today’s threats differ from those that organizations encountered earlier. Understanding the latest threat information is one of the essential keys for protection against evolving cyber-attacks—especially as they increase in number and complexity.

  2. IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticators benefits security and reduces cost

    Identity and authentication management represents the greatest security return on investment an organization can make.

  3. Magic Quadrant for Endpoint Protection Platforms

    Effective endpoint security leads the way for business success, but with more vendors than ever claiming best-in-class status, identifying the solution right for you can be a daunting task.

  4. Cyberthreat Defense 2014 Report for North America& Europe

    Know your enemy! Establishing an effective defensive strategy is crucial with today's rapidly evolving cyberthreats. Understanding the cybercriminals' techniques used to perpetrate successful attacks is essential.

  5. Broken Trust: Exposing the Malicious Use of Keys and Certificates

    Published jointly by iSIGHT Partners and Venafi, this whitepaper explores the motivations of attackers, the practices they employ to execute their attacks, and what you can do to keep these criminals out.

  6. Understand The State Of Data Security And Privacy: 2013 To 2014

    This Forrester data-driven report outlines budgeting and spending, technology adoption plans, and other key breach, data protection, and privacy trends in North American and European organizations for 2013 to 2014.

  7. It’s Cyber Warfare

    How UK financial institutions can implement identity-based security to win the war against online attacks.

  8. Data Security Architecture Overview

    The Vormetric Data Security Architecture white paper provides an understanding of the architectural underpinning of Vormetric Data Security Platform, a comprehensive solution for a data-centric security architecture for minimizing the attack surface of sensitive data and to assist in meeting data compliance requirements.  It uses Vormetric Data Firewall™, encryption, access controls and security intelligence across physical, virtual and traditional environments.

  9. Information Security Industry Predictions for 2014: Cloud

    Infosecurity asked the industry to share its 2014 trend predictions, and the industry delivered. We have categorised the predictions into five topics and created a news article for each.

  10. Data Security in the Cloud

    Cloud computing has transformed the way organizations approach IT, enabling them to become more agile, introduce new business models, provide more services, and reduce IT costs. Cloud computing technologies can be implemented in a wide variety of architectures, under different service and deployment models, and can coexist with other technologies and software design approaches.

  11. Server Data is the Main Target for Advanced Persistent Threats

    Cybercrime continues to make headlines but the nature of the attacks is changing. Within a few weeks of each other in early 2013, The New York Times, Apple, Twitter and other high-profile organizations openly admitted to significant data breaches. However, the nature of cyberattacks is changing. Threats have become more frequent and insidious, and the cloud and Big Data have added new risks.

  12. Five Key Ways to Increase Network Security

    Why enterprises need to take a smart approach to DDI (DNS, DHCP, IP Address Management) to protect their infrastructure.

  13. The 2013 Vormetric Insider Threat Report

    While the security community remains fixated on advanced malware, tried-and-true insider threats and related attacks remain a vexing problem for most organizations. In fact, ESG research indicates that more than half (54%) of IT and security professionals believe that insider threats are more difficult to detect/prevent today than they were in 2011.

  14. Big Data, Big Risks

    The cloud computing landscape continues to realize explosive growth. This white paper outlines what IT and security professionals need to know about the significant security risks of big data, including critical security vulnerabilities, risks, and challenges, key business and technical issues such as controls, privacy, and compliance and effective and reliable protection strategies.

  15. Analysis of the Global Network Access Control Market

    Solve top IT challenges with NAC. Streamline and automate your IT operations today.

  16. Website Security In Corporate America

    We often think of malware as being designed to sit beneath the radar, collecting data in stealth mode, for the purposes of fraud or corporate espionage. Increasingly however, we’re witnessing attacks on corporations designed to cause substantial economic losses via wholesale destruction.

  17. Securing Sensitive Data within Amazon Web Services EC2 and EBS - Challenges and Solutions to Protecting Data within the AWS Cloud

    In this white paper, learn about the specific problems around data protection when using servers within Amazon Web Services (AWS) environments.

  18. Symantec 2013 Internet Security Threat Report

    Get an overview and analysis of the year in global threat activity with the Symantec 2013 Internet Security Threat Report.

  19. The Insider Threat: How Privileged Users Put Critical Data at Risk

    With insider-related fraud up 43% in 2012, clearly traditional security approaches are not working. Data loss prevention (DLP) systems, Internet monitoring tools and other controls are failing to stop a growing number of data breaches linked to insiders

  20. Frost & Sullivan: Analysis of the Global NAC Market

    The comprehensive Frost & Sullivan global NAC market analysis highlights drivers, technology trends, competitive landscape and required product competence.

What’s hot on Infosecurity Magazine?