Infosecurity White Papers

  1. ITCi White Paper: Challenges and Opportunities of PCI

    Learn how to align PCI compliance with business processes for a more streamlined and reliable IT infrastructure with this whitepaper from the IT Compliance Institute.

  2. Beyond PCI Checklists: Securing Cardholder Data with Enhanced File Integrity Monitoring

    How do organisations pass their PCI DSS audits yet still suffer security breaches? Paying attention to PCI DSS checklists only partially secures the cardholder environment.

  3. Every Man’s Guide to Combat Threats within Your Organization

    With an increasing mobile force using a variety of wireless devices to access the Internet and download applications, confidential information becomes more easily accessible to hackers. This has complicated the job of information security professionals and raised awareness of how vulnerable mobile computing devices can be.

  4. Log Management - How to Develop the Right Strategy for Business and Compliance

    From compliance requirements to data gathering for forensic purposes, companies have opened up the floodgates to log data. Based on audit findings and internal investigations, they have deployed expensive technologies and lots of personnel without a full understanding of what to log and why. Companies and organizations need a log management strategy that combines requirements from auditors with a process for the security team based on risk to gain better visibility into log data.

  5. Data Loss Prevention (DLP) Technology: Realizing Enhanced Productivity and Timely ROI

    The conclusion is quite clear: companies cannot afford data loss, however caused. Prevention becomes a priority in the strategy to data loss. DLP comes down to reducing the risks of information loss by locating and controlling sensitive data.

  6. Reversing the rise of the surveillance state: 11 Measures to Protect Personal Privacy and Hold Government to Account

    At the Infosecurity Virtual Conference 2009, Eleanor Laing, Conservative MP, presented in our session, 'Infosecurity in government: What's going wrong, and how to fix it'. This download is the Conservative policy paper, titled Reversing the rise of the surveillance state.

  7. Endpoint Security: A Timely Warning for Today’s Economic Climate

    The responses received in a recent IDC survey regarding corporate IT security give rise to serious concerns about the pace at which enterprises are responding (or are able to respond) to the growing security threat to the endpoints of their IT infrastructure. In particular, the responses show that enterprises appear to be falling behind in the following areas: HIPS usage, layered protection, mobility security.

  8. Advances in Endpoint Security

    The past few years have witnessed several highly publicized cases of security breaches at major corporations. These high-profile incidents have emphasized the need to protect and control sensitive corporate information within the enterprise environment. As more data resides at the endpoint, administrators are being forced to defend a new architecture that has critical corporate resources dispersed around the globe.

  9. 5 Ways to Reduce IT Audit Tax

    Organizations oftentimes spend upwards of 50% more on compliance efforts than necessary. This is due to the inefficient deployment of resources and manpower to satisfy the burgeoning set of internal and external compliance and audit mandates. This whitepaper outlines five ways to streamline compliance efforts and thereby reduce the IT audit tax.

  10. Effective Insider Threat Management

    White paper offers practical advice to ensure success.

  11. Continuous Data Protection

    White paper offers insight into technologies enabling quick, easy data recovery to any point in time

  12. Reducing Vulnerability to Downtime

    White paper reports on technology which complements data resiliency and recovery strategies.

  13. Image Spam: The Threat Returns

    White paper reports on severity of email/web-borne threat and offers solutions for exposing it.

  14. Web Use and the Risk to Business

    White paper reports on new Web threats and what’s being done to defend businesses.

  15. Cut the Chaos from Firewall Management IDC examines "A Life Cycle Approach for Network Security Management"

    IDC examines the challenging process of firewall operations and the growing need for an automated approach to controlling and analyzing network security changes and configuration management processes throughout their entire life cycle.

  16. Guide to Evaluating Two-Factor Authentication Solutions

    Passwords are a known weak link and continue to be exploited at alarming rates, making two-factor authentication mandatory for many organizations. Whether you’re planning to implement two-factor authentication for the first time or are looking to expand or upgrade your current implementation, this whitepaper will help you choose the two-factor solution that is right for your business.

  17. Understanding the Critical Role of Device Management and Security in Your Business' Mobile Strategy

    As businesses embrace mobility, IT professionals are facing new challenges. But gone are the days when stodgy IT departments would fight this business imperative. Most organisations today are simply trying to get smarter about how to manage and secure their increasingly mobile population and distributed assets.

  18. The Total Cost of Email: Putting a Price Tag on Your Email Environment

    You can’t afford to ignore email archiving, security, internal policy or regulatory requirements, but can you afford to keep paying for it as multiple systems on top of your email system?

  19. Achieving Compliance with GSi Code of Connection (CoCo) with Lumension® Solutions

    To develop the necessary trust and confidence within the Public Sector communities and between Government and the citizens, a common approach to risk management and the implementation of anInformation Assurance framework becomes increasingly important.

  20. Spam; Viruses; Data Loss; Use Policy; Where to begin?

    The IT threat landscape is evolving. Organised crime is involved & it’s big business. Criminals are hunting for confidential business data & the techniques they employ are increasingly complex.

What’s hot on Infosecurity Magazine?