Infosecurity White Papers

Download and engage with the latest White Papers focused on Information Security strategy, technology & insight. Each White Paper is editorially approved to ensure the research presented is up to date, high quality and relevant to personal development or workplace implementation.

 

Broward College Increases Visibility, Control & Compliance with ForeScout CounterACT

Broward College needed a secure, efficient and flexible way to manage the personal and college-owned devices connecting to its network, spanning four campuses and seven satellite locations.

Brought to you by
ForeScout

2014 Global Compliance: The legal obligations for encryption of personal data in the United States, Europe, Asia and Australia

Updated for 2014, this document examines the global legal obligations to encrypt personal data – included both national and industry drivers.

Brought to you by
Vormetric

Secure Data Center Architecture for Today's Transformative IT Environment

Learn about Juniper Network's MetaFabric reference architecture to address your cloud, mobility and big data challenges which form part of your business drivers today.

Brought to you by
IGX

IDG Survey: State of IT Cyber Defense Maturity

Download this global survey from over 1500 IT security professionals that sheds light on the state of cyber defense maturity. In addition to affording new incident and violation trends across industry and region, the results yield insights into IT security management capabilities, deficiencies and planned investments. See where your organization fits on the IT cyber defense maturity spectrum compared to your peers.

Brought to you by
ForeScout

Server Data is the Main Target for Advanced Persistent Threats: THE CASE FOR A DATA-CENTRIC SECURITY MODEL

This white paper discusses why the old data security model no longer works, the inherent risks of APTs and why perimeter defenses alone are not sufficient to safeguard organizations against the current generation of security threats.

Brought to you by
Vormetric

Ogren Group Report: Continuous Endpoint Compliance. Integrating Process, Policy and Technology to Preempt Threats and Reduce Costs

Many organizations spend millions on endpoint security tools – such as antivirus, encryption, data loss prevention (DLP), and so on – only to have end users turn off or disable those tools. Even in well-managed enterprises, host-based security tools typically do not work properly on at least 20% of systems.

Brought to you by
ForeScout

Vormetric Insider Threat Report – European Edition (EMEA)

The 2014 Vormetric Insider Threat Report - European Edition represents the result of analysis of interviews with over 500 IT and Security managers in major European enterprises around the question of insider threats.

Brought to you by
Vormetric

SHHHH… It’s SSH: The Keys to the Enterprise Left Under the Doormat (2014 Aberdeen Research Report)

There’s a secret lurking in almost every enterprise: access to the most sensitive data, servers and cloud using SSH is going unchecked. 64% of enterprises surveyed by Aberdeen Group have not established security policies for SSH and don’t have SSH security controls to protect sensitive access.

Brought to you by
Venafi

McAfee Labs Threat Report- (fourth quarter 2013)

Welcome to the McAfee Labs Threats Report: Fourth Quarter 2013. As we kick off the New Year, we take a fresh approach to our Threats Reports. Beginning with this edition, we present a shorter publication, with “Key Topics” covering top threats or security issues from the quarter. We also focus (on a rotating basis) on threat concerns surrounding the four IT megatrends: mobile, social, cloud, and big data. The report is now visually richer and easier to navigate.

Brought to you by
Venafi

You’re Already Compromised: Exposing SSH as an Attack Vector

Secure Shell (SSH) keys are an integral part of the digital world. It enables one system to access another remotely in a secure manner, enforcing authentication, authorization, and encryption of communications, Unfortunately, cybercriminals do take advantage of the trust that is established by SSH. Cybercriminals can use improperly secure SSH keys against organizations to gain access to critical systems and intellectual property that could damage a company’s brand and bottom line.

Brought to you by
Venafi

Top Ten Ways to Defend your Network against the Latest SSL Exploits

Staying on top of the latest web exploits can be a challenge for Network Admins who are worried about simply keeping up with all the day-to-day management tasks required by a complex environment. This whitepaper details many of the most recent popular SSL-related exploits that your network is likely vulnerable to, along with simple steps you can immediately take to protect yourself.

Brought to you by
DigiCert

A Proper Foundation: Extended Validation SSL. A critical model for SSL digital certificates and browser trust

To bolster consumer trust in the foundation of ecommerce, several CAs and browser vendors came together to establish a higher security approach based on an advanced tier of SSL certificate with very high standards for validation and assurance. “Extended Validation” was the final name chosen for the new certificates by the CA/Browser Forum.

Brought to you by
Entrust