Infosecurity White Papers

Download and engage with the latest White Papers focused on Information Security strategy, technology & insight. Each White Paper is editorially approved to ensure the research presented is up to date, high quality and relevant to personal development or workplace implementation.

 

Third-Party Cyber Risk: 8 Key Considerations

This Whitepaper looks at why third-party security risk matters, some of the forces transforming this space, and how to prioritise risk.

Brought to you by
RiskRecon

A Guide to Mastering Managed File Transfer

A Guide to Mastering Managed File Transfer

Read this whitepaper now to learn the steps you should take to select the right file transfer solution to meet your organizational needs.

Brought to you by
Progress

Third-Party Risk Management Playbook

What impact a Ripple Event could have on your organization.

Brought to you by
RiskRecon

Risk-Based Vulnerability Management: Focus on the Vulnerabilities That Pose the Greatest Risk

Risk-Based Vulnerability Management: Focus on the Vulnerabilities That Pose the Greatest Risk

Find out why CVSS fails as a prioritization tool – and why it’s imperative to consider business context, including vulnerability data, threat intelligence and asset criticality

Brought to you by
Tenable

Coders Conquer Security: Your Battle Plan to Defeat the OWASP Top 10

This whitepaper is your ultimate, fully-interactive guide to understanding each infamous entry in the OWASP Top 10, gaining insight into how each bug operates.

Brought to you by
Secure Code Warrior

Employees Quit. Data Leaves.

Employees Quit. Data Leaves.

This report presents a life-like scenario depicting how and why a departing member of staff can prove to be a significant security threat

Brought to you by
Code42

Taking a Positive Approach to Developer Security

How to make secure code training and tools simple, relevant and engaging

Brought to you by
Secure Code Warrior

Tackling Insider Threat with Data Loss Protection

Tackling Insider Threat with Data Loss Protection

This report describes how to build an insider threat program.

Brought to you by
Code42

Responding to Security Questionnaires

Why vendor security questionnaires aren't going away, and what the impact will be on your team

Brought to you by
Whistic

Mastering Mainframe Maintenance

Mastering Mainframe Maintenance

Download this whitepaper to learn how mainframe computers can be handled efficiently.

Brought to you by
Comarch

Why Privileged Access Can Work at Scale and Better Defend You

This whitepaper explores why organizations need better privileged access management (PAM) and how they can master defense at scale.

Brought to you by
Remediant

How Deception Efforts can Bolster Your Security Posture

How Deception Efforts can Bolster Your Security Posture

This report covers and assessed CDS and the market positions of 18 vendors delivering products and services for CDS. The report includes relative vendor value and value spotlight charts, market size and forecast and segment futures for CDS.

Brought to you by
Acalvio

What’s Hot on Infosecurity Magazine?