Infosecurity White Papers

Download and engage with the latest White Papers focused on Information Security strategy, technology & insight. Each White Paper is editorially approved to ensure the research presented is up to date, high quality and relevant to personal development or workplace implementation.

 

Paradigm Shifts

Download this whitepaper looking into the current and emerging threats that will make inroads in the 2018 landscape.

Brought to you by
Trend Micro

Data Governance Implementation Survey 2018

Data Governance Implementation Survey 2018

Over 500 SQL Server professionals participated in the "Data Governance Implementation Survey 2018", with respondents coming from across the globe and representing a wide range of job roles, company sizes, and industries.

Brought to you by
Redgate

Self-healing Cybersecurity for the Digital Era

Staying ahead of the latest security threats can be a challenge for any organization.

Brought to you by
Seceon

A Collaborative Approach to Compliance

A Collaborative Approach to Compliance

An in-depth perspective on information security compliance and broader IT GRC programmes, revealing their inherent complexity, their collaborative nature and introducing the principles of ‘collaborative compliance’, which can be leveraged to gain operational efficiencies and costs savings.

Brought to you by
SureCloud

Providing Banks and Financial Institutions with Legally Compliant Digital Signatures

Learn more about legally binding digital signatures based on qualified digital certificates and the benefits they provide to banks and financial institutions

Brought to you by
vintegrisTECH

Cyber Intrusion Services Casebook

Cyber Intrusion Services Casebook

Drawn from real-life engagements, this annual casebook provides valuable insights into the evolving tactics, techniques, and procedures used by today’s most sophisticated adversaries.

Brought to you by
Crowdstrike

Quarterly Threat Report

The Proofpoint Quarterly Threat Report highlights the trends and key takeaways of attacks we see within our large customer base and in the wider threat landscape.

Brought to you by
Proofpoint

How the Hybrid Cloud Changes the Game for Security

How the Hybrid Cloud Changes the Game for Security

Examining the dynamics of the hybrid cloud, and the challenges that organizations are facing as they adopt the latest technologies.

Brought to you by
Trend Micro

Responding to a Data Subject Access Request under the GDPR

This whitepaper discusses the challenges faced by organizations in complying with a Data Subject Access Request (DSAR) and the impact the General Data Protection Regulation (GDPR) will have in responding to such requests from 25th May 2018.

Brought to you by
BSI Group

New Approach to MSSP Security and Profitability

New Approach to MSSP Security and Profitability

Despite the vast amounts being spent on today’s state of the art cybersecurity solutions - data breaches are happening at an increasing rate with over 600 detected and reported in the U.S. alone by August 2016, and greater severity with over 20 million exposed records, a 20% increase over record-breaking years 2014 and 2015, according to the ITRC.

Brought to you by
Seceon

The Top 5 Myths of Next-Gen Endpoint Protection

It can be tough finding the time to pick through the marketing FUD to find the solution that will deliver the best protection. So let’s unpack five common myths associated with next-gen endpoint protection.

Brought to you by
Trend Micro

Transforming Security Operations with Automation and Analytics

Transforming Security Operations with Automation and Analytics

How do security professionals know that they are looking at the right thing?

Brought to you by
Fidelis Cybersecurity

What’s Hot on Infosecurity Magazine?