Infosecurity White Papers

  1. The Endpoint Security Management Buyers Guide

    Keeping track of 10,000+ of anything is a management nightmare. With ongoing compliance oversight and evolving security attacks against vulnerable endpoint devices, getting a handle on managing endpoint becomes more important every day.

  2. Enhancing Security Through a Trust-based Approach

    Cyber threats are becoming ever more insidious and affect organizations of all sizes, spanning all industries. Organizations need to take a more proactive stance on security, and focus on only allowing what is good to execute on their networks to create an atmosphere of trust.

  3. Data Security: Complying With PCI DSS Encryption Rules

    Companies must achieve and maintain compliance with PCI DSS, but also manage geographically distributed networks, usually containing both structured and unstructured data. Learn how Vormetric Data Security helps organisations meet PCI DSS compliance demands with a transparent data security approach that requires minimal administrative support and does not undermine performance.

  4. 2013 - State of End Point

    We are pleased to present the results of the 2013 State of the Endpoint study sponsored by Lumension® and conducted by Ponemon Institute. Since 2010, we have tracked endpoint risk in organizations, the resources to address the risk and the technologies deployed to manage threats.

  5. The Dynamic Nature of Virtualization Security - The need for real-time vulnerability management and risk assessment

    The cornerstones of a proactive security strategy are vulnerability management and risk assessment. However, traditional “scan-and-patch” vulnerability scanning approaches are inadequate for dynamic, virtualized environments.

  6. Risk Modeling & Attack Simulation for Proactive Cyber Security

    Use predictive solutions to stay ahead of cyber security threats using security risk management.

  7. The CISO’s Guide to Ensuring IT Resiliency in the Face of Change

    Without an on-going security testing regiment in place, even the most sophisticated IT defence measures will not guard organizations against crippling attacks, data leaks or internal sabotage.

  8. Evaluating & Selecting a Secure, Managed File Transfer Solution

    Are you considering a secure, managed file transfer solution to address the security of information and data transferred to, from and inside your organization?

  9. AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

    Managing risk within today’s enterprise network environments represents a significant challenge. Enterprises have more IP addresses, servers, mobile phones, partners, applications and data than ever before.

  10. 2012 Bit9 Cyber Security Research Report

    According to the results of a recent survey conducted by Bit9, European IT managers in France, Germany, Spain and the UK are aware of the changing nature of cyber attacks; how these more advanced attacks target their infrastructure; and what they would like to see as the most effective strategies for protecting their organisations.

  11. 2012 Malnet Report

    Malnets (malware networks) are extensive infrastructures embedded in the Internet that are designed to deliver mass market attacks to the largest possible audience on a continuous basis. In 2012, Blue Coat expects these infrastructures will be responsible for more than two thirds of all malicious cyber-attacks.

  12. Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services

    Securing any device used by mobile workers is a challenge but laptop computers, still the most vulnerable of all endpoint devices, presents the biggest threat to corporate security. Laptops today are far more numerous that other mobile devices and are more tightly integrated into the enterprise infrastructure. They are prime targets for malware attacks.

  13. FireEye Advanced Threat Report 1H 2012

    The FireEye® Advanced Threat Report for the first half of 2012 is based on research and trend analysis conducted by the FireEye Malware Intelligence Lab. This report provides an overview of the current threat landscape, evolving advanced malware and advanced persistent threat (APT) tactics, and the level of infiltration seen in organizations’ networks today.

  14. IT security. Are you in control?

    In the real world the security landscape can be a harsh environment. Hackers are using more sophisticated attack methods to penetrate networks and steal company data; social networks are being compromised and used to distribute malware, and instigate phishing attacks; and the proliferation of mobile and cloud applications are opening new vulnerabilities ripe for exploitation.

  15. Advanced Targeted Attacks: How to Protect Against the Next Generation of Cyber Attacks

    Despite spending more than $20 billion annually on IT security, over 95 percent of companies harbor advanced malware within their networks. Learn how to combat the cybercriminals that continue to outsmart older, signature-based security technologies.

  16. Business-Class File Sharing Best Practices

    What happens when employees go around IT and use their own Dropbox-like services, webmail or USB drives to send company information? This behavior presents significant security and compliance risks including: Loss of control over who has access to files and data, lack of visibility and audit trails, risk of data breaches and compliance violations.

  17. Bringing Your Internet Acceptable Use Policy Up to 2012 Standards

    One of the most essential elements of monitoring employees’ online behavior is crafting a strong, updated policy for Internet use.

  18. Enterprise Information Management Security Options

    As organizations increasingly participate in a collaborative economy, sharing documents becomes ever more crucial.

  19. Virtualization Security Risks: How to Develop Your Strategic Approach Now

    Today, what virtualization software can accomplish is nearly limitless. But has your computer security methodology and software kept up?

  20. Security Policy: Five Keys to User Compliance

    Business users are a key part of a company's security, and even the most conscientious employees can introduce serious breaches of security policy.

What’s hot on Infosecurity Magazine?