Infosecurity White Papers

Download and engage with the latest White Papers focused on Information Security strategy, technology & insight. Each White Paper is editorially approved to ensure the research presented is up to date, high quality and relevant to personal development or workplace implementation.

 

Exposing the Unknown: How Sandboxing Technology Fights Modern Threats

Exposing the Unknown: How Sandboxing Technology Fights Modern Threats

Learn how to better protect your business assets and deepen your understanding of the threat landscape with this white paper.

Brought to you by
CheckPoint, NTT Com Security

Stop DDoS Attacks with Advanced, Effective Protection

Stop DDoS Attacks with Advanced, Effective Protection

Brought to you by
CloudFlare

Intelligent Systems in Action: The Rise of the Machines has Already Begun

Intelligent Systems in Action: The Rise of the Machines has Already Begun

How important is it for your business to exploit intelligent systems to compete effectively in your market(s) over the coming three years? Read this report based on a recent survey of 521 senior IT pros.

Brought to you by
Ipswitch

Countering Insider Threats in eDiscovery

When it comes to your data, if it’s valuable, it’s vulnerable. Is your organisation prepared?

Brought to you by
Nuix

More threats. Fewer experts. There’s a Growing Skills Gap. How will you Manage?

More threats. Fewer experts. There’s a Growing Skills Gap. How will you Manage?

There's a growing skills gap in IT security skills. So what are your options? Is it really an option to do nothing at all?

Brought to you by
Check Point Software Technologies, NTT Com Security

Shutting the Door on the Attacker

Case study lessons learned from the front lines to explain why it is important to understand what type of incident you are dealing with.

Brought to you by
Fidelis Cybersecurity

5 Failing Tools and Security Trends

5 Failing Tools and Security Trends

What are the five security tools we will continue to use — but offer decreasing levels of security

Brought to you by
Observable

The Definitive Guide to Managed File Transfer

The Growing Challenge: Moving Files to Support Critical Business. How important is all this? The boom in file transfer activities, and the cost of getting it wrong, makes it very important.

Brought to you by
Ipswitch

Introduction to PCI and PII: Securing your Organizations Data

A must-read white paper for IT, Legal, and C-Level Professionals

Brought to you by
Sherpa

Social Media a Growing Risk for Corporate Security

Social Media a Growing Risk for Corporate Security

Unless companies come to realise that their security perimeters must grow beyond the corporate firewall to encompass social media networks and other areas such as the Dark Web, then the global cost of cyber crime will continue to mushroom.

Brought to you by
Cyberint

Making Sure Employees Are Not Your Weakest Link

Despite the effort governance, compliance and security functions put into managing information security, employees often remain the weakest link in an organisation’s defence.

Brought to you by
Bluegoose

What’s Hot on Infosecurity Magazine?