Infosecurity White Papers

Download and engage with the latest White Papers focused on Information Security strategy, technology & insight. Each White Paper is editorially approved to ensure the research presented is up to date, high quality and relevant to personal development or workplace implementation.

 

Security Configuration Management: Getting Back to IT Security Basics

Security Configuration Management: Getting Back to IT Security Basics

Cloud Computing. Virtualization. Social Networking. IT Consumerization. What do these trends all have in common?

Brought to you by
Tripwire

A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today

These are the top 10 enterprise mobility security threats today

Brought to you by
BlackBerry

Four Kinds of Password Management

Four Kinds of Password Management

Gartner clients asking about "password management" may have in mind one of four topics covered by Gartner research. Security and risk management leaders responsible for IAM can use this report to identify the research pertinent to their needs.

Brought to you by
LogMeIn

Ready or Not? GDPR Maturity Across Vertical Industries

Download this whitepaper to find out why GDPR is going to have such a big impact.

Brought to you by
BlackBerry

How Proactive Prevention Can Eliminate an Unknown Threat

How Proactive Prevention Can Eliminate an Unknown Threat

A recent study from the Ponemon Institute stated that over 90% of enterprises have vulnerability backlogs of up to 5,000. An over reliance on detection is not working.

Brought to you by
Check Point Software Technologies

SIEM for Beginners

Everything you wanted to know about log management but were afraid to ask

Brought to you by
Alien Vault

Open Source Network Security Tools for Beginners

Open Source Network Security Tools for Beginners

Let’s take a look at a few of the tools available, which will not only provide some answers, but also help you learn more about the topic.

Brought to you by
Alien Vault

Finding a Password Manager for Your Business

A guide to evaluating and comparing solutions.

Brought to you by
LogMeIn

How to Build a Security Operations Center

How to Build a Security Operations Center

Whether you’re protecting a bank or the local grocery store, certain common sense security rules apply. At the very least, you need locks on entrances and exits, cash registers and vaults as well as cameras pointed at these places and others throughout the facility.

Brought to you by
Alien Vault

Why GDPR Is Important and What You Need to Do to Get to Grips With It

Preparedness, technology tools, smart thinking and expert counsel will help you meet the tough challenges of incoming rules on data protection.

Brought to you by
BlackBerry

Detecting Compromised Credentials with UEBA

Detecting Compromised Credentials with UEBA

All of the biggest data breaches, judged either by number of records breached or the importance of the data stolen, have involved attackers leveraging stolen user credentials to gain access.

Brought to you by
Exabeam

Future Focus: Is Your Enterprise Ready for IoT?

A recent study by Juniper Research revealed that by 2020, the number of connected devices will have reached approximately 38.5 billion.

Brought to you by
BlackBerry

What’s Hot on Infosecurity Magazine?