Infosecurity White Papers

Download and engage with the latest White Papers focused on Information Security strategy, technology & insight. Each White Paper is editorially approved to ensure the research presented is up to date, high quality and relevant to personal development or workplace implementation.

 

The New Mindset for Building Secure Services in the Cloud

The New Mindset for Building Secure Services in the Cloud

Cloud computing is reshaping not only the technology landscape, but the very way companies think about and execute their innovation process and practices.

Brought to you by
sumologic

Insider Threats: How to Spot them and How to Stop them

More than one-third of all cybercrime incidents and security breaches are caused by insiders.

Brought to you by
Nuix

Has SIEM Lost Its Magic? Top five reasons why SIEMs are failing security professionals

Has SIEM Lost Its Magic? Top five reasons why SIEMs are failing security professionals

SIEM solutions have been around since 2000, and they were developed with the goal of helping organizations in the early detection of targeted attacks and data breaches. But are they working? Are they delivering enough value? Have they lost their magic?

Brought to you by
sumologic

Website Security Statistics Report 2015

WhiteHat Security’s Website Security Statistics Report provides a one-of-a-kind perspective on the state of website security and the issues that organizations must address in order to conduct business online safely

Brought to you by
WhiteHat

Quick Start Guide to Ethical Hacking

Quick Start Guide to Ethical Hacking

In this Guide to Ethical Hacking, Matt Ford of Foursys sets out the definition, goals and processes involved in the use of ethical hacking.

Brought to you by
Foursys

Cashing in with a Secure Software Defined Data Centre

This technology spotlight discusses how to seamlessly integrate different vendor technologies solutions and unlock the full potential of the software-defined data centre.

Brought to you by
IGX Global

Banishing Explicit Content by Redefining the Secure Web Gateway

Banishing Explicit Content by Redefining the Secure Web Gateway

Porn; love it or pretend it’s something you once saw by accident at a friend’s house, was at one stage both the undisputed king and at the same time, utter scourge of the Internet.

Brought to you by
CensorNet

2015 Data Protection Maturity Report

This survey on data protection maturity highlights the threats, responses, policies, and technologies of a shifting data security landscape. It also reveals how organizations have made progress—and where they may still be at risk.

Brought to you by
Lumension

Gain More Effective and Efficient Endpoint Security

Gain More Effective and Efficient Endpoint Security

The volume and sophistication of malware is skyrocketing, and traditional anti-virus approaches are struggling to keep up.

Brought to you by
Lumension

Insider Threat Report: European Edition

European organisations are lagging behind US counterparts in terms of dealing with data security.

Brought to you by
Vormetric

451 Research: Vormetric Encryption Gateway and Platform Strategy

451 Research: Vormetric Encryption Gateway and Platform Strategy

This report offers a current analysis of Vormetric's recent product releases, including the solutions offering tokenization with dynamic data masking, Teradata support, and cloud encryption gateway.

Brought to you by
Vormetric

Windows Server 2003 End-of-Support: How to Securely Extend Service Life

Microsoft withdraws support for Windows Server 2003 on July 14, 2015. Here’s how you need to respond to protect your organization’s information assets.

Brought to you by
Lumension

What’s Hot on Infosecurity Magazine?