Infosecurity White Papers

Download and engage with the latest White Papers focused on Information Security strategy, technology & insight. Each White Paper is editorially approved to ensure the research presented is up to date, high quality and relevant to personal development or workplace implementation.

 

Top 3 Requirements to Turbocharge your Forensics

Eliminate limitations and complexities within security investigations and make everyone on the team an expert analyst.

Brought to you by
WireX

Data Loss Prevention as a Critical Component of Cyber Insurance Strategy

Data Loss Prevention as a Critical Component of Cyber Insurance Strategy

Uncover the types of internal threats that North American organizations need to be aware of.

Brought to you by
Zecurion

50 Shades of Dark: How to Use the Dark Web for Threat Intelligence

There's a lot of talk about the dark web these days, including how cyber criminals use it to spread malware, leak intellectual property, and publish user account credentials.

Brought to you by
Recorded Future

Exposing the Unknown: How Sandboxing Technology Fights Modern Threats

Exposing the Unknown: How Sandboxing Technology Fights Modern Threats

Learn how to better protect your business assets and deepen your understanding of the threat landscape with this white paper.

Brought to you by
CheckPoint, NTT Security

Stop DDoS Attacks with Advanced, Effective Protection

Stop DDoS Attacks with Advanced, Effective Protection

Brought to you by
CloudFlare

Intelligent Systems in Action: The Rise of the Machines has Already Begun

Intelligent Systems in Action: The Rise of the Machines has Already Begun

How important is it for your business to exploit intelligent systems to compete effectively in your market(s) over the coming three years? Read this report based on a recent survey of 521 senior IT pros.

Brought to you by
Ipswitch

Countering Insider Threats in eDiscovery

When it comes to your data, if it’s valuable, it’s vulnerable. Is your organisation prepared?

Brought to you by
Nuix

More threats. Fewer experts. There’s a Growing Skills Gap. How will you Manage?

More threats. Fewer experts. There’s a Growing Skills Gap. How will you Manage?

There's a growing skills gap in IT security skills. So what are your options? Is it really an option to do nothing at all?

Brought to you by
Check Point Software Technologies, NTT Security

Shutting the Door on the Attacker

Case study lessons learned from the front lines to explain why it is important to understand what type of incident you are dealing with.

Brought to you by
Fidelis Cybersecurity

5 Failing Tools and Security Trends

5 Failing Tools and Security Trends

What are the five security tools we will continue to use — but offer decreasing levels of security

Brought to you by
Observable

The Definitive Guide to Managed File Transfer

The Growing Challenge: Moving Files to Support Critical Business. How important is all this? The boom in file transfer activities, and the cost of getting it wrong, makes it very important.

Brought to you by
Ipswitch

What’s Hot on Infosecurity Magazine?