Infosecurity White Papers

Download and engage with the latest White Papers focused on Information Security strategy, technology & insight. Each White Paper is editorially approved to ensure the research presented is up to date, high quality and relevant to personal development or workplace implementation.

 

The What, How and Why of Zero Trust Cybersecurity

The What, How and Why of Zero Trust Cybersecurity

Read this white paper to learn the what, how and why of Zero Trust cybersecurity – along with gaining an understanding of how to implement an effective Zero Trust strategy for your organisation.

Brought to you by
Wallix

2020 Vulnerability Stats Report

This white paper, Edgescan’s 2020 Vulnerability Stats Report, measures the current state of full-stack security, based on tens of thousands of global assessments.

A Beginner's Guide to Access Security

A Beginner's Guide to Access Security

This white paper forms a comprehensive beginner’s guide for anyone looking to understand the basics of access security.

Brought to you by
Wallix

Coronavirus Report: Popular Android Apps Impersonated by Malware

This whitepaper expands on several highly popular applications that cyber-criminals are using to compromise devices, as well as the potential impact on the victim.

Brought to you by
Bitdefender

Identity Gap in Third-Party Risk Management

Identity Gap in Third-Party Risk Management

Read this whitepaper to learn what is required to effectively manage and reduce third party risks, to increase efficiency and eliminate over-provisioning

Brought to you by
SecZetta

10 Ways to Secure and Accelerate a Modern Workforce

Read this white paper to learn how you can safeguard sensitive data and block malicious content, without slowing your employees and your IT team down.

Brought to you by
Cloudflare

Future of Authentication Report 2020

Future of Authentication Report 2020

Infosecurity Magazine is proud to have collaborated on this Future of Authentication Report 2020 with Raconteur, working with researchers and industry experts to examine the authentication landscape.

Brought to you by
Infosecurity Magazine

E-Book: Data Loss Prevention - Protect Information and Reduce Data Breach Risks

In an ever-connected and data-reliant world, information security risks are aplenty. It’s never been more important for organizations to ensure their data security strategies are effective, productive and well-aligned.

Brought to you by
DocsCorp

The Business Case for Internet Isolation

The Business Case for Internet Isolation

In this whitepaper, we delve into the benefits of web isolation and provide an analysis on the true hidden costs of failed web security approaches.

Brought to you by
Menlo Security

The Guide to Your Organisations Biggest Threat Vectors

This white paper explores why CSOs need to understand the varying kinds of data breaches that can come both from within and without their own organizations.

Brought to you by
Wallix

2019 Year in Review: Cyber-Threats and Trends Report

2019 Year in Review: Cyber-Threats and Trends Report

2019 Year in Review: Cyber-Threats and Trends Report New exploits and increased relevance of Distributed Denial of Service (DDoS) attacks The number of DDoS attacks increased 180% in 2019. Are you prepared for 2020?

Brought to you by
Neustar

Is SaaS the New Trojan Horse in the Age of Cloud Computing?

This whitepaper looks at how users are no longer chained to their desks or the data center to conduct work. Resulting in a company’s attack surface now being unlimited and ubiquitous.

Brought to you by
Menlo Security

What’s Hot on Infosecurity Magazine?