Infosecurity White Papers

Download and engage with the latest White Papers focused on Information Security strategy, technology & insight. Each White Paper is editorially approved to ensure the research presented is up to date, high quality and relevant to personal development or workplace implementation.

 

Anatomy of a Cyber-Attack

How does an organization “protect” themselves from a breach? In this whitepaper, learn how to determine network health before proceeding with advisory engagements.

Brought to you by
Infocyte

Navigating a Security Wasteland

In this whitepaper, Cybrary discusses how “managing your enterprise security organization like a small business” is pivotal when it comes to application & cloud security.

Brought to you by
ThreatConnect

Security Threats: Is That a Trojan in Your Pocket?

The popularity, portability and precarious security mobile devices an attractive target for cybercriminals. It is time to get serious about mobile security. Start with a corporate mobility policy to define your mobile security strategy, and deploy an EMM solution to make it happen.

Brought to you by
SOTI

C-Suite IT Execs Call for Federal Privacy Rules

Companies in the US are meeting new security and privacy regulations head on and they’re ready for more. When it arrives, though, they’d like more clarity.

Brought to you by
Infosecurity North America

The Gamer Theory of Threat Hunting

Gamify your threat hunting experience! Many organizations are shifting to iterative threat hunting exercises based around intelligence operations. This paper outlines gamified threat hunting levels, and key concepts ‘hunt gamers’ should focus on.

Brought to you by
Anomali

Deteque Threat Report 2018

Deteque is a division of Spamhaus and integrated with a global network of service providers and a community of researchers who have been dedicated to combating DNS abuse since 2008. Each year the research team at Spamhaus’ Malware Labs publishes its findings and this Report builds on the threat landscape of 2017 with latest figures from 2018 to date.

Brought to you by
Spamhaus Technology

Building Your Bullet Proof Incident Response Plan

This whitepaper looks at the current state of corporate cyber security when even the largest organizations are often overwhelmed by the volume of flagged incidents and unknown files that need to be investigated. Meanwhile, businesses’ and customers’ sensitive information is at risk of being compromised by the needle in the haystack: the major threat hiding in plain sight among false positives.

Brought to you by
Intezer

Stopping Data Exfiltration and Malware Spread Through DNS

Recent research from IDC predicts worldwide spending on security-related hardware, software, and services will reach $119.9 billion in 2021.

Brought to you by
Infoblox

A Fresh Look at Security Analytics

Most enterprises are at least discussing security analytics. But how are they actually deploying these tools? And with what levels of automation and orchestration?

Brought to you by
ThreatConnect

Investing in Cyber Insurance: the What, the Why and the How

Just as the expectations that a business will experience a cyber incident are increasing, so too are the costs of recovering from those breaches. As of 2018, the global average cost of a data breach is $3.6 million, or about $141 per stolen data record.

Brought to you by
Wallix Group

A Practical Guide To Outsourcing Your Service Desk

For businesses new to outsourcing their services, outsourcing the service desk functionality can be an easy first step.

Brought to you by
Comarch

Building Your Response Plan: Critical Steps and Best Practices

These days, businesses of all sizes need to be concerned about cyber attacks. The attack size and frequency have continued to rise. What’s more, the DDoS underground has made it easier for anyone – even without technical skills – to launch a damaging DDoS attack.

Brought to you by
Activereach Ltd

What’s Hot on Infosecurity Magazine?