Infosecurity White Papers

Download and engage with the latest White Papers focused on Information Security strategy, technology & insight. Each White Paper is editorially approved to ensure the research presented is up to date, high quality and relevant to personal development or workplace implementation.

 

The Evolution of Enterprise Networking and Network Security

The Evolution of Enterprise Networking and Network Security

Networking and Security for a Bygone Era.

Brought to you by
Meta Networks

Inside the Mind of a Hacker - How Cybercriminals are Targeting your Business

Criminal hackers work like any other business, as part of commercial - albeit illegal - networks, with clear business models. We have come a long way from the lone hacker stereotype.

Brought to you by
Cloakware by Irdeto

Enough of the Noise: Let's Embrace GDPR

Enough of the Noise: Let's Embrace GDPR

Why is GDPR a change for good?

Brought to you by
Apricorn

Stopping Email Fraud

Today’s email attacks have evolved. Unfortunately, most security tools haven’t evolved with them.

Brought to you by
Proofpoint

Are You Ready to Respond?

Are You Ready to Respond?

Evaluate and Improve Your Ability to Respond to the Next Attack.

Brought to you by
FireEye

5 Essential Keys to Least Privilege

5 Essential Keys to Least Privilege

Protect Data, Users, and Applications with Thoughtful Limitations.

Brought to you by
VMware

Email Fraud Threat Report

Proofpoint analyzed more than 160 billion emails sent to more than 2,400 companies spanning 150 countries. Here are their findings for 2017.

Brought to you by
Proofpoint

Virtualization's Hidden Gem: Application Security

Virtualization's Hidden Gem: Application Security

How network virtualization and micro-segmentation can secure your application infrastructure

Brought to you by
VMware

The Necessity of Software Protection

Cloakware reports are intended to provide factual, informative descriptions of important topics in cybersecurity, coupled with statistics and perspectives on currently important events and attacks.

Brought to you by
Cloakware by Irdeto

The Definitive Guide to Data Loss Prevention

The Definitive Guide to Data Loss Prevention

This comprehensive guide provides what you need to understand, evaluate, and succeed with today's DLP.

Brought to you by
Digital Guardian

Gartner Magic Quadrant Report for Enterprise Information Archiving

Originally designed for file and email retention, enterprise information archiving (EIA) now incorporates products and solutions for handling a far wider range of user messaging content.

Brought to you by
Proofpoint

Who Needs Malware?

Who Needs Malware?

How adversaries use fileless attacks to evade your security.

Brought to you by
Crowdstrike

What’s Hot on Infosecurity Magazine?