Infosecurity White Papers

Download and engage with the latest White Papers focused on Information Security strategy, technology & insight. Each White Paper is editorially approved to ensure the research presented is up to date, high quality and relevant to personal development or workplace implementation.

 

The Ultimate OWASP Top 10 Cheat Sheet

The Ultimate OWASP Top 10 Cheat Sheet

With the OWASP Top 10 being updated for the first time since 2017, get this handy cheat sheet to get to make the most out of this invaluable tool.

Brought to you by
Immersive Labs

The Complexities Of Investigating Illegal Activity On The Dark Web

The Complexities Of Investigating Illegal Activity On The Dark Web

This whitepaper examines what the Dark Web is, the tools needed to penetrate the Dark web and some of the obstacles faced by law enforcement officials when trying to collect evidence from it.

Brought to you by
Exterro

The Essential Guide to Enterprise SSL Management

The Essential Guide to Enterprise SSL Management

Read this whitepaper to understand the key aspects to consider when choosing a certificate authority.

Brought to you by
HID Global

Security, Risk & Compliance: What to Look for in a Technology Solution

Security, Risk & Compliance: What to Look for in a Technology Solution

Whether evaluating your current methods or exploring new ones, in this guide we discuss the key questions to ask when considering technology solutions

Brought to you by
Diligent

Incident Response Comes to the Cloud: 3 Reasons to Choose an IaaS Solution

Incident Response Comes to the Cloud: 3 Reasons to Choose an IaaS Solution

This whitepaper explores technology approaches that enable IR in the cloud and the reasons behind choosing an Infrastructure as a Service (IaaS) solution.

Brought to you by
Exterro

The FIDO Authentication Handbook

The FIDO Authentication Handbook

IT security professionals agree that passwords are obsolete - the question is: what's the best way to move forward?

Brought to you by
Thales

Autonomic Security Operations - 10X Transformation of the Security Operations
Center

Autonomic Security Operations - 10X Transformation of the Security Operations Center

As the cybersecurity landscape evolves, the SOC also needs to - Read this whitepaper for helpful pointers on why and how.

Brought to you by
Chronicle Security

Cybersecurity 2021

Cybersecurity 2021

Infosecurity Magazine is proud to have collaborated on this Cybersecurity 2021 feature with Raconteur, published in The Sunday Times, working with researchers and industry experts to examine the cybersecurity landscape

Country Comparison: Global Security Insights Report 2021

Country Comparison: Global Security Insights Report 2021

Find out how senior security professionals across the world compare when it comes to adapting to the challenges of the distributed workplace.

Brought to you by
VMware

Five Tips for Partnering With Your IT Security Team

Five Tips for Partnering With Your IT Security Team

Explore some key strategies to create an environment of trust and goodwill to optimize your security.

Brought to you by
Exterro

Owning your own Access Security - The key to building strong cloud security and avoiding the risk of vendor lock-in

Owning your own Access Security - The key to building strong cloud security and avoiding the risk of vendor lock-in

Read this white paper to discover the tangible benefits of selecting a vendor-neutral cloud security solution to address the evolving security risks and privacy requirements.

Brought to you by
Thales

Building the Optimal Future of Work: A Technology Roadmap

Building the Optimal Future of Work: A Technology Roadmap

Download this guide to learn how to effectively prioritize digital transformation and optimize visibility, enhances operations, fosters innovation and promotes corporate purpose.

Brought to you by
Diligent

What’s Hot on Infosecurity Magazine?