Infosecurity White Papers

Download and engage with the latest White Papers focused on Information Security strategy, technology & insight. Each White Paper is editorially approved to ensure the research presented is up to date, high quality and relevant to personal development or workplace implementation.

 

The 5 Steps To 
Effective Data Protection

The 5 Steps To Effective Data Protection

This whitepaper will take you through the five steps to implementing effective data classification within your organization.

Brought to you by
HANDD Business Solutions

A Guide to Reducing Risk for the Retail Industry

A Guide to Reducing Risk for the Retail Industry

Read this whitepaper to learn who ethical hackers (security researchers) are, how eCommerce stores work with them and best practices for creating a strong vulnerability disclosure process.

Brought to you by
Intigriti

Exposing Malware in  Linux-Based Multi-Cloud Environments

Exposing Malware in Linux-Based Multi-Cloud Environments

Learn why malware is propagating in multi-cloud environments

Brought to you by
VMware

A Buyer's Guide for Threat Intelligence

A Buyer's Guide for Threat Intelligence

Read this whitepaper to learn how shifting your security program from reactive to proactive can benefit your business and much more.

Brought to you by
ZeroFOX

2021 ICS OT Cybersecurity Year In Review Exec Summary

2021 ICS OT Cybersecurity Year In Review Exec Summary

Read this whitepaper to learn what you need to know to protect your critical assets.

Brought to you by
Dragos

The Practical Executive's Guide to Data Loss Prevention

The Practical Executive's Guide to Data Loss Prevention

Download this whitepaper for information on successfully deploying DLP.

Brought to you by
Forcepoint

The Weak Password Report 2022

The Weak Password Report 2022

Password attacks are on the rise because passwords themselves are vulnerable to attack. What makes them vulnerable? This year’s Weak Password Report looks at both the human and the tech side of why passwords are the weakest link in an organization’s network.

Brought to you by
Specops

2022 Cyber Risk Report: Contextualizing the MITRE ATT&CK Framework for Risk Reduction

2022 Cyber Risk Report: Contextualizing the MITRE ATT&CK Framework for Risk Reduction

This new 2022 Cyber Risk report provides an operational and tactical roadmap you can use to make decisions about where to apply your cybersecurity capabilities.

Brought to you by
eSentire

Employee Personal Information (PII) 
Exposure Online: An Underrecognized 
Business Risk

Employee Personal Information (PII) Exposure Online: An Underrecognized Business Risk

Download this white paper to discover why the mountain of employee personal information available that’s already available on the open web is a potentially serious and costly problem for businesses.

Brought to you by
DeleteMe

2022 Annual State of Phishing Report

2022 Annual State of Phishing Report

Download the report to see how credential theft, business email compromise and ransomware threats continue to target businesses like yours and much more.

Brought to you by
Cofense

State of Cybersecurity Report 2022

State of Cybersecurity Report 2022

Welcome to the fourth annual State of Cybersecurity Report brought to you by Infosecurity Europe and Infosecurity Magazine. This research presents and outlines the most influential security trends affecting the industry as a whole in 2022.

Brought to you by
Infosecurity Europe, Infosecurity Magazine

The Key To Remediating Secrets in Code

The Key To Remediating Secrets in Code

Download this whitepaper to find out more about how to locate and remediate secrets in code

Brought to you by
Apiiro

What’s Hot on Infosecurity Magazine?