Infosecurity White Papers

Download and engage with the latest White Papers focused on Information Security strategy, technology & insight. Each White Paper is editorially approved to ensure the research presented is up to date, high quality and relevant to personal development or workplace implementation.

 

Discover How Customer SIEM Requirements Have Evolved

In this paper, Securosis, details how security needs have evolved for organizations and what to look for when choosing a SIEM.

Brought to you by
IBM

What Financial Institutions Need to Know About Secure Shell

Secure Shell is ubiquitous within the financial services industry. However, Secure Shell is often viewed as “part of the plumbing” and typically does not get much attention from Compliance, Audit or Security.

Brought to you by
SSH Communications Security

Video Download: An Enterprise Security Platform Approach to Threat Prevention

Video Download: An Enterprise Security Platform Approach to Threat Prevention

Adversaries are becoming more advanced, carrying out high profile attacks against enterprises, government, the defense industrial base, and other key industries.

Brought to you by
Palo Alto

Video Download: Hiding in Plain Sight - What’s Really Happening on Your Network

Video Download: Hiding in Plain Sight - What’s Really Happening on Your Network

Today’s cyber threats hide in plain sight amidst your network traffic, making them nearly impossible to defend against.

Brought to you by
Palo Alto

Getting Started With a Zero Trust Approach to Network Security

Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.

Brought to you by
Palo Alto

Application, Usage and Threat Report

The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise.

Brought to you by
Palo Alto

Gartner’s 2014 Magic Quadrant for Secure Email Gateways Report

Gartner’s 2014 Magic Quadrant for Secure Email Gateways Report

Gartner, Inc. positions Proofpoint in the Leaders quadrant in its 2014 Magic Quadrant for Secure Email Gateways report. Read the full report, compliments of Proofpoint.

Brought to you by
Proofpoint

Forrester Research: Gaps in SSH Security Create an Open Door for Attackers

In this Technology Adoption Profile (TAP) by Forrester Research, analyst, John Kindervag, emphasizes, “Two-thirds of IT security professionals do not perform the necessary checks for unauthorized use of SSH keys.”

Brought to you by
Venafi

Enterprise Application Security - The 5 Key Benefits of Source Code Analysis

Enterprise Application Security - The 5 Key Benefits of Source Code Analysis

Static Code Analysis is the technique of automatically analyzing the application’s source and binary code to find security vulnerabilities. Two categories exist in this realm: Binary Code Analysis (BCA) and Source Code Analysis (SCA).

Brought to you by
Checkmarx

The Human Factor: How Attacks Exploit People as the Weakest Link in Security

Get Insight into the ways attackers exploit end-users’ psychology. Learn how attackers exploit end-users have significant security implications for enterprise preparedness and defensive strategies.

Brought to you by
Proofpoint

Solution Brief: Are You Ready for the PCI DSS v3 Deadlines?

Are you one of those organizations that meet the PCI DSS requirements for keys and certificates using internal scripts or manual processes just in time for your next audit, after countless hours of preparation?

Brought to you by
Venafi

Gartner Paper: Predictive Defense and Real-Time Insight: The Next Step in Advanced Threat Protection

As clearly evidenced by the daily headlines about security breaches, traditional defense tools are failing to protect enterprises from advanced targeted attacks and new sophisticated forms of malware.

Brought to you by
Proofpoint