Infosecurity White Papers

Download and engage with the latest White Papers focused on Information Security strategy, technology & insight. Each White Paper is editorially approved to ensure the research presented is up to date, high quality and relevant to personal development or workplace implementation.

 

5 Steps to Starting Your Cloud Perimeter Journey

Businesses that pursue digital transformation will be rewarded, but not without facing challenges with their ever-expanding attack surface as well as their existing network and security architectures.

Brought to you by
Activereach Ltd, Akamai

The 2017 Equifax Breach: Retrospective Look & Lessons Learned

The Equifax breach that was announced in September 2017 is considered to be the biggest breach in history with hackers having stolen the personally identifiable information (PII) of nearly 147.9 million of the company’s customers,primarily located in the United States

Brought to you by
WhiteSource

Secure SSO to Office 365 and Other Cloud Applications with a Cloud-Based Authentication Solution

This white paper explores the widespread use of Office 365, what that means from a security perspective and how a cloud-based authentication solution can enable single sign on for Office 365 and a range of other business-critical services and applications.

Brought to you by
Entrust Datacard

Forrester Report: The State of Application Security- 2018

Application Security Is Worsening, But Automation Offers Hope

Brought to you by
WhiteSource

Privileged Access Management Key to Compliance with the NIS Directive

This white paper will shed light on the challenges and implications of the NIS Directive with regard to cybersecurity practices in European nations, and make a case for how a privileged access management solution easily helps them in their quest for compliance.

Brought to you by
Wallix Group

Enforce a Zero Trust Security Model in Today’s Hostile Environment

Companies of all types are pursuing digital transformation. The goal is to improve customer value,operate with greater efficiency and agility, and increase innovation. But as companies leverage new cloud and DevOps workflows to build their digital business, security has not kept pace.

Brought to you by
Activereach Ltd, Akamai

Executive Brief: File Sharing & Collaboration Leads to Security Gaps in Financial Services Firms

This Research Brief focuses on unstructured data(such as Microsoft Office files, PDFs, and image files), and the security risks present in many of the internal business processes that use it.

Brought to you by
BlackBerry

Ponemon Report: The Value of Threat Intelligence

Ponemon Report: The Value of Threat Intelligence

The Ponemon Institute surveyed 1,000+ US and UK security professionals on a range of threat intelligence topics. Results show that organizations are rapidly incorporating threat intelligence into their security programs. Learn key findings and more.

Brought to you by
Anomoli

Forrester Findings: Modern Authentication Methods that Protect and Enable

Forrester Findings: Modern Authentication Methods that Protect and Enable

Forrester recently surveyed 100 IT and security executives to understand their current approaches to user authentication and access management. Check out their report to learn what authentication methods other companies are using and which of these methods are most effective.

Brought to you by
Entrust Datacard

Pen Test Metrics 2018

What is your current confidence level in your application security program?

Brought to you by
Cobalt

The Evolving and Challenging Landscape of Identity Management

In 2017, identity fraud hit an all-time high of 175,000 incidents according to the Cifas’ National Fraud Database and the number continues to rise.

Brought to you by
BSI Group

Is DNS your Security Achilles Heel?

Explore how attackers take advantage of recursive DNS and learn best practices you can follow to mitigate the risks.

Brought to you by
Activereach Ltd, Akamai

What’s Hot on Infosecurity Magazine?