Infosecurity White Papers

Download and engage with the latest White Papers focused on Information Security strategy, technology & insight. Each White Paper is editorially approved to ensure the research presented is up to date, high quality and relevant to personal development or workplace implementation.

 

How to Produce a World-Class Threat Intelligence Capability

How to Produce a World-Class Threat Intelligence Capability

Discover the six core competencies that comprise a successful threat intelligence program.

Brought to you by
Recorded Future

CISSP® Planning Kit

CISSP Planning Kit: Your Guide to CISSP Certification and Beyond. Studying for the CISSP exam can seem overwhelming, which is why (ISC)2 developed this quick guide. Download this planning kit for a CISSP overview, study tips, preview of how to maintain your certification, and more!

Brought to you by
(ISC)²

Preparing for the GDPR: DPOs, PIAs, and Data Mapping

Preparing for the GDPR: DPOs, PIAs, and Data Mapping

With the General Data Protection Regulation coming online in the European Union by May 2018 — by its own terms affecting organizations worldwide that collect or process EU citizens’ personal data — we have an opportunity to test how ready privacy professionals are for a contemporary and comprehensive privacy regulation that makes obligatory many of the last decade’s “privacy-on-the-ground” practices.

Brought to you by
TRUSTe

Enterprise Mobile: The New Threat Vector

Why Employee Mobile Devices Are Undermining Your Enterprise Security Efforts

Brought to you by
Appthority

Security Configuration Management for Dummies

Security Configuration Management for Dummies

If you're in charge of securing your organization's network, reducing its attack surface, or maintaining and proving compliance with regulations, this book is for you.

Brought to you by
Tripwire

Secure Email Messaging in Office 365: Four key considerations

Organisations worldwide are moving to Microsoft Office 365 for hosted email services, and for good reason.

Brought to you by
Egress

Understand Your Attacker: A Practical Guide to Identifying TTPs With Threat Intelligence

Understand Your Attacker: A Practical Guide to Identifying TTPs With Threat Intelligence

Combat threats by understanding your adversaries and the tools, techniques, and processes (TTPs) they're likely to weaponize.

Brought to you by
Recorded Future

13 Steps to Meeting the Security Challenges of the New EU GDPR

Once in force, the European Union General Data Protection Regulation (GDPR) will require every multinational company that offers products or services to European Union residents to adhere to a strict set of data privacy and security measures.

Brought to you by
Tenable

Threat Hunting, Shadow IT and Other Bold New Frontiers

Threat Hunting, Shadow IT and Other Bold New Frontiers

The company continues to move beyond the vulnerability management realm, enabling threat hunting and ‘shadow IT’ discovery use cases via a mix of its sensor options: agent scanning, passive listening, traditional scanning and log analysis.

Brought to you by
Tenable

4 Fallacies around Security Breaches to Consider for 2017 Budget

The Cyber security landscape changes quickly and planning your 2017 investment strategy may be something you are iterating right now.

Brought to you by
WireX

5 Signs You Need a Mobile Security Game Plan

5 Signs You Need a Mobile Security Game Plan

Mobile security is on everyone's to do list, but when do you know it’s time for your enterprise to have a mobile security game plan? Appthority tackles that question in its latest eBook, 5 Signs You Need a Mobile Security Game Plan.

Brought to you by
Appthority

Cyber Security and Packet Capture: Making the Connection

What makes cyberattacks so tricky is that there isn’t a traditional, physical crime scene where evidence can be collected for investigation.

Brought to you by
Napatech

What’s Hot on Infosecurity Magazine?