Infosecurity White Papers

Download and engage with the latest White Papers focused on Information Security strategy, technology & insight. Each White Paper is editorially approved to ensure the research presented is up to date, high quality and relevant to personal development or workplace implementation.

 

Top 10 Database Threats

Top 10 Database Threats

Practical applications for Big Data have become widespread, and Big Data has now become the new "prize" for hackers.

Brought to you by
Imperva

Top 10 DDoS Attack Trends

DDoS attacks are constantly evolving, both in terms of size as well as sophistication. This paper outlines the top 10 DDoS attack trends.

Brought to you by
Imperva

The Cloud App Visibility Blindspot

The Cloud App Visibility Blindspot

This white paper covers the significant blindspot in visibility and increased risks for organizations in the face of “Shadow IT”.

Brought to you by
Imperva

DDoS Response Playbook

This handbook provides you with a practical guide for planning and executing a DDoS response plan.

Brought to you by
Imperva

Video Download: ESG on Information-driven Security Based on RSA Security Analytics & RSA ECAT

Video Download: ESG on Information-driven Security Based on RSA Security Analytics & RSA ECAT

Watch Enterprise Strategy Group (ESG) Senior Analyst Jon Oltsik discuss why organizations need to develop strong processes and technologies for incident detection and response.

Brought to you by
RSA

Rethinking Endpoint Security

Mention endpoint security to an infosec professional and he or she will likely think of antivirus software, vulnerability scanning, and patch management.

Brought to you by
RSA

Information-driven Security and RSA Security Analytics and RSA ECAT

Large organizations are under constant cyber-attack and many are breached each day. How many? Aside from the infamous breaches at Neiman-Marcus, the New York Times, and Target in 2013, ESG research indicates that nearly half of all enterprise organizations experienced at least one successful malware-based attack over the past two years.

Brought to you by
RSA

Tinker Tailor Soldier Cyber

Tinker Tailor Soldier Cyber

Cyber! Botnets! Malware! We are all well read into the fifth domain, the cyber sphere, the challenges of the ethernet - aren’t we? Of course not! It is a sad reality that most would doubt that cyber presents one of the most significant security challenges in our history. The digital skills gap coupled with the unending stream of public/private sector network vulnerabilities continues and increasingly puts sovereign security and success at an unacceptable risk.

Why Mobile Is the Next Digital Identity

Why Mobile Is the Next Digital Identity

How can this growing acceptance of the mobile platform — across geographies, verticals, cultures and even age groups — be leveraged and extended to secure traditional digital identities in both the physical and online spaces?

Brought to you by
Entrust

Compliance Support For ISO 27001

These published guidelines cover many areas surrounding “access control”, “audit and accountability”, “incident response”, and “system and information integrity”

Brought to you by
LogRhythm

451 Research: Honeypots, Threat Intelligence & SIEM

Security information and event management (SIEM) products provide a plethora of data that can be enriched to the nth degree. However, this data is of little value unless it can be converted into meaningful information that organizations can use to proactively detect and respond to threats in an acceptable time frame.

Brought to you by
LogRhythm

BLOOR: Security Intelligence: Solving the Puzzle for Actionable Insight

…reducing the time to detect and respond to advanced cyber threats

Brought to you by
LogRhythm