Infosecurity White Papers
Download and engage with the latest White Papers focused on Information Security strategy, technology & insight. Each White Paper is editorially approved to ensure the research presented is up to date, high quality and relevant to personal development or workplace implementation.

NIS2 - What is it and how it impacts cybersecurity
NIS2 is an EU directive adopted by the EU parliament in November 2022. It aims to protect critical infrastructure within the EU from cyber threats and to achieve a high level of security across the EU.
Brought to you by
Logpoint

Secure Enterprise Network Traffic Against Modern Cyberthreats
Learn how to effectively protect enterprise network traffic from file-based exploits and attacks with ICAP content inspection.
Brought to you by
OPSWAT

Using Managed File Transfer to Secure Your Cloud Data
This white paper examines the pulse of the cloud, from why companies are leaving on-premise operations to the state of today’s cloud security and file transfers.
Brought to you by
Fortra

Insider Risk - How Prepared Are You?
Learn the four stages of insider risk maturity and what you can do to protect your business.
Brought to you by
Veriato

How to make the best security investment for your organization
The SIEM Buyer’s Guide discusses the pros and cons of standalone SIEM platforms versus converged SIEM Solutions and how to make the best security investment for your organization. You will discover the advantages of modern SIEM platforms and why you should include SOAR and UEBA in your security operations.
Brought to you by
Logpoint

What Is The NIS 2 Directive and What Does It Mean For You?
Risk Ledger’s report on the new European Network and Information Systems Directive (NIS2) highlights the key differences between NIS2 and its previous iteration, and explains what businesses have to do now to prepare for its adoption ahead of its 2024 implementation deadline.

The State of Security: Finance
This Risk Ledger report on ‘The State of Security: Finance’ provides insights into the current state of security among suppliers to the financial services industry, based on data from over 200 organisations.

The Blueprint For Protecting Critical Systems
This guide outlines the five top tips to guarantee the most appropriate OT security strategy for providers of essential services, to ensure they maintain their responsibilities for maintaining service continuity and providing effective protection for their critical resources, processes and facilities.
Brought to you by
QinetiQ

The State of Cybersecurity in the Supply Chain: Data Insights 2023
This new report by Risk Ledger provides data-driven insights into the current state of supply chain cyber security, based on data from over 2500 suppliers sharing information on their security posture against more than 200 security controls on the Risk Ledger platform.

2023 State of Enterprise Digital Forensics and Incident Response
The third annual State of Enterprise Digital Forensics and Incident Response report provides intelligence tailored to the needs and planning horizons of enterprise DFIR decision-makers — particularly those involved with IT, cybersecurity, and governance.
Brought to you by
Magnet Forensics

How to Enhance Microsoft Email Security
Understand how to plug email security gaps with additional security while complimenting an existing email platform.
Brought to you by
Fortra

A Window on Email Security: Protecting Your Business from Hidden Email Threats
Microsoft 365 and other providers can protect organizations from spam and malware, but oftentimes fall short in robust data loss prevention and threat intel
Brought to you by
Fortra