Infosecurity White Papers

Download and engage with the latest White Papers focused on Information Security strategy, technology & insight. Each White Paper is editorially approved to ensure the research presented is up to date, high quality and relevant to personal development or workplace implementation.

 

Blind Trust Is Not A Security Strategy - Lessons From Cloud Adopters

Blind Trust Is Not A Security Strategy - Lessons From Cloud Adopters

An Enterprise Management Associates® (EMA™) white paper prepared for iland

Brought to you by
Iland

2016 State of Data Security and Compliance Report

Ipswitch and Vanson-Bourne polled 555 IT team members who work in companies across the globe with greater than 500 employees, between October-November 2015 to learn about their file transfer habits and goals.

Brought to you by
Ipswitch

How to Comply with the New European Data Protection Laws

How to Comply with the New European Data Protection Laws

The GDPR will come into force in May 2018. Organisations have until then to review their processes and security strategies in order to comply with it.

Brought to you by
VMWare

Building Resilient Cloud Network Architectures

This paper builds on our recent Pragmatic Security for Cloud and Hybrid Networks research, focusing on cloud-native network architectures that provide security and availability infeasible in a traditional data center.

Brought to you by
Resilient Systems

The Rise of the Cloud Security Professional

The Rise of the Cloud Security Professional

This white paper looks at the relationship between IT and the C-suite, and the role of CCSPs as key players on the strategic forefront of a company’s life.

Brought to you by
(ISC)²

Detection & Analysis of Dridex with CyberShield AnD for IT

Dridex has been one of most notable threats since its appearance in late 2014 and throughout 2015. A strain of malware evolving from the infamous Zeus family, it is designed to steal personal banking information and credentials.

Brought to you by
Cyberbit

Not all Certificate Authorities are Created Equal

Not all Certificate Authorities are Created Equal

There have been a string of successful attacks on certificate authorities (CAs) this year, and the threat to CAs will certainly not abate.

Brought to you by
Symantec

Webinar Report:The Five Stages of Insider Threat

Webinar Report:The Five Stages of Insider Threat

Much has been made of the insider threat faced by organisations this year and many vendors are hooked on the message of fixing the problem with technologies but the issue requires a lot more thought than that.

Brought to you by
Infinigate

Resilient Systems and the Rise of the Incident Response Platforms

Maintaining a discipline of strong cybersecurity has become increasingly difficult at enterprise organizations for several reasons.

Brought to you by
Resilient Systems

Questions that I am Most Frequently Asked by New Buyers of SSL Certificates

If you are new to the SSL certificate market, I am sure that you will have at least one of these questions as well.

Brought to you by
Symantec

How Trust Really Affects Online Shoppers’ Decision to Buy

How Trust Really Affects Online Shoppers’ Decision to Buy

Trust is essential, but just how well are website owners doing at building trust with their potential online customers?

Brought to you by
Symantec

5 Ways of Empowering your Incident Response Team

How should incident response teams work to mitigate and respond to your network’s cyber threats and incidents?

Brought to you by
Cyberbit

What’s Hot on Infosecurity Magazine?