Infosecurity White Papers

Download and engage with the latest White Papers focused on Information Security strategy, technology & insight. Each White Paper is editorially approved to ensure the research presented is up to date, high quality and relevant to personal development or workplace implementation.

 

Data Breach Survey 2019

Data Breach Survey 2019

The results of the research can offer insights that could help to inform the allocation of security budgets and strategies so that investment can be directed to where it will achieve the greatest impact in preventing costly data breaches.

Brought to you by
Egress

The Vulnerable Landscape: Metrics, Insights and Impact for Security Leaders

Vulnerabilities and network incidents are on the rise. Enterprises face a race against the clock to patch the riskiest vulnerabilities before attackers exploit them.

Brought to you by
eSentire

State of Cybersecurity Report 2019

State of Cybersecurity Report 2019

An exclusive report by Infosecurity Magazine. Discover the trends that are driving the information security industry forward in 2019.

Brought to you by
Infosecurity Europe, Infosecurity Magazine

Why Outdated Access Control Systems Are a Big Problem

Physical access control doesn’t have to be the weak link in your security program. IDG and HID Global® have partnered to deliver a practical guide capturing best practices for implementing new, more dynamic access control technologies.

Brought to you by
HID Global

Building a Modern Information Governance Strategy.

Building a Modern Information Governance Strategy.

Information management is getting harder. It's time to rethink your approach, developing more modern Information Governance strategies

Brought to you by
Mimecast

2019 Open Source Security & Risk Analysis

The 2019 OSSRA report offers an in-depth look at the state of open source security, compliance and code quality risk in commercial software.

Brought to you by
Synopsys

Choosing the Right Managed File Transfer Solution for Your Budget

Choosing the Right Managed File Transfer Solution for Your Budget

In this ultimate buyer’s guide, you’ll find the information you need to successfully evaluate different managed file transfer solutions.

Brought to you by
Helpsystems

Remediating The Insider Threat

This white paper addresses the following questions to explore how organisations can address the insider threat and secure sensitive data

Brought to you by
Egress

Stopping the Attackers You Trust: A Deception-Based Approach to Insider Threats

Stopping the Attackers You Trust: A Deception-Based Approach to Insider Threats

In this whitepaper you’ll find out, how you can monitor for unauthorized access without eroding employee trust and how you can expedite the investigation of potential malicious insider activity.

Brought to you by
Illusive Networks

Empowering Developers to Write Secure Code

This whitepaper showcases how building a security culture in your organization is key to unlocking innovation, staying agile and reducing the financial impact of insecure code.

Brought to you by
Secure Code Warrior

Operationalizing your Micro-Segmentation Deployment

Operationalizing your Micro-Segmentation Deployment

Network segmentation, and more specifically micro-segmentation, is widely agreed upon as a security best practice.

Brought to you by
Guardicore

Best Practices for Implementing Security Awareness Training

This recent, in-depth survey of security professionals by Osterman Research shows that the leading security concerns across organizations are all areas in which security awareness training can yield significant benefits.

Brought to you by
Mimecast

What’s Hot on Infosecurity Magazine?