Infosecurity White Papers

Download and engage with the latest White Papers focused on Information Security strategy, technology & insight. Each White Paper is editorially approved to ensure the research presented is up to date, high quality and relevant to personal development or workplace implementation.

 

5 Ways to Save Time and Money on Your Data Backups – and Impress Your Boss Too

This short e-book will highlight five key approaches that can not only help you save time managing backups, but control costs too.

Brought to you by
Dell

Redefining Your Data Protection Strategy: Focus on Recovery

Redefining Your Data Protection Strategy: Focus on Recovery

In response to increasing user expectations on access to and availability of data, IT infrastructure needs to evolve, particularly for data protection.

Brought to you by
Dell

BYOD, is the big bad wolf dead?

Bring your own device (BYOD) became the universally accepted hall pass for ‘Let’s sidestep the policies we once insisted were important.

Brought to you by
CensorNet

How to Make the Right File Transfer Choices

How to Make the Right File Transfer Choices

Stagnate or Automate? It’s a familiar question for IT, and is a matter of asking: Do you keep doing things the way you’ve been doing them—making do with “good enough” file transfer systems for example—or do you consider automating technologies and processes that have been performed manually up till now?

Brought to you by
Ipswitch

Cybersecurity – You’re Already Compromised

Corporate spending on IT security reached a record $71 billion in 2014. This represents an 8% increase over 2013, and it’s predicted to increase another 8% in 2015.

Brought to you by
Level 3

Managed file transfer for Dummies

Managed file transfer for Dummies

Moving data securely and reliably to support critical business processes has never been more important — and challenging.

Brought to you by
Ipswitch

Infosecurity Europe Industry Survey - Executive Summary

How can organisations build resilience and balance prevention and response?

Brought to you by
Infosecurity Europe

The WTF: Where's the file E-Guide

The WTF: Where's the file E-Guide

How to always know where files are at all times, and whether you’re ready to eliminate manual tasks and custom scripting once and for all

Brought to you by
Ipswitch

Secure Pipes: Changing the Expectation of Your Internet Service Providers

The reality of today’s Internet is that cyber threats are becoming increasingly more sophisticated. Advanced Persistent threats (APT), botnets, zero-day attacks, and countless malware variants have caused significant monetary damage on a global scale. Essentially, APTs are the result of lessons learned from cyber nation-state attacks such as GhostNet and Stuxnet.

Brought to you by
Level 3

Top 10 Database Threats

Top 10 Database Threats

Practical applications for Big Data have become widespread, and Big Data has now become the new "prize" for hackers.

Brought to you by
Imperva

Top 10 DDoS Attack Trends

DDoS attacks are constantly evolving, both in terms of size as well as sophistication. This paper outlines the top 10 DDoS attack trends.

Brought to you by
Imperva

The Cloud App Visibility Blindspot

The Cloud App Visibility Blindspot

This white paper covers the significant blindspot in visibility and increased risks for organizations in the face of “Shadow IT”.

Brought to you by
Imperva

What’s Hot on Infosecurity Magazine?