Infosecurity White Papers

Download and engage with the latest White Papers focused on Information Security strategy, technology & insight. Each White Paper is editorially approved to ensure the research presented is up to date, high quality and relevant to personal development or workplace implementation.

 

Looking Forward and Looking Back: Lookout's Cybersecurity Predictions

Looking Forward and Looking Back: Lookout's Cybersecurity Predictions

Instead of assessing what the next 365 days will bring, we are going to look forward with a three year rolling window.

Brought to you by
Lookout

Preparing for the General Data Protection Regulation

Data protection laws across the EU are out of date and barely fit for purpose. Additionally, each member state has its own regime, creating a nightmare of compliance for businesses in the middle of the second decade of the 21st century.

Brought to you by
Ipswitch

Micro-Segmentation Builds Security Into Your Data Center’s DNA

Micro-Segmentation Builds Security Into Your Data Center’s DNA

Traditional network security systems have a major flaw: Once malware gets into the data center, it can move unhindered from workload to workload, wreaking havoc before it can be stopped. Micro-segmentation changes all that.

Brought to you by
VMware | Gyrocom

For the EU’s New Data Protection Regulation, Encryption Should be the Default

This document discusses the changes being made to the European data protection landscape and suggests that encryption should be the default choice for protecting data. However, this should just be part of the overall data security strategy, which must be comprehensive and consistent.

Brought to you by
Vormetric

Key Management Compliance - Explained

Key Management Compliance - Explained

Cryptographic key management is an umbrella term which refers to the various administration processes that govern the life cycle of keys andthe keys’ associated crypto material and metadata.

Brought to you by
Cryptomathic

Securing Endpoints Against The Next Generation of Attacks

In today’s ‘always on, always connected’ world where sensitive data is almost certain to be stored electronically, organisations can no longer afford to operate without some form of Endpoint Protection. What does 2016 have in store for us?

Brought to you by
Trend Micro

Transforming Email Security: Insights with Forrester & Aetna

Transforming Email Security: Insights with Forrester & Aetna

In the wake of high-profile email phishing attacks, heightened concerns around digital identity fraud have raised consumer expectations around the promise of your brand.

Brought to you by
Agari

Anticipating Cyber Attacks: There’s No Abbottabad in Cyber Space

Download this white paper explaining how to track the data trail of threats, attackers, methods, and operations before they execute attacks.

Brought to you by
Recorded Future

Point-of-Sale System Breaches: Threats to the Retail and Hospitality Industries

Point-of-Sale System Breaches: Threats to the Retail and Hospitality Industries

From a security perspective, the most immediate risk to businesses and customers lies in accepting payments. The information customers hand over, if captured, can be used by cybercriminals to commit credit card fraud.

Brought to you by
Trend Micro

What CISOs Need to Know About The New NIST: Guidelines for Secure Shell

On August 20, 2014, The Computer Security Division of The National Institute of Standards and Technology (NIST) released Interagency Report 7966 (NISTIR 7966).

Brought to you by
SSH Communications Security

Best Practices for Migrating to Office 365

Best Practices for Migrating to Office 365

Many organizations are seriously considering the deployment of Microsoft Office 365 and Exchange Online. The result is that the penetration of Office 365 is expected to more than double by 2017, primarily at the expense of on-premises Exchange.

Brought to you by
Trend Micro

Evolving Threats Call For Integrated Endpoint Security Solutions With Holistic Visibility

High-profile breaches of personal data at retailers, government agencies, health care companies, and other entities make the news with frightening regularity.

Brought to you by
Trend Micro

What’s Hot on Infosecurity Magazine?