Infosecurity White Papers

Download and engage with the latest White Papers focused on Information Security strategy, technology & insight. Each White Paper is editorially approved to ensure the research presented is up to date, high quality and relevant to personal development or workplace implementation.

 

ESG:DNS for Cybersecurity Advantage

What does the threat landscape mean for enterprise organizations and what should they do to close the cybersecurity gap?

Brought to you by
Infoblox

Identity is Security

With breaches frequently targeting enterprise users instead of their network and endpoints, it’s more important than ever for IT leaders to recognize that identity is security.

Brought to you by
SailPoint

The State of Open Source Vulnerabilities Management

The rise in open source usage has lead to a dramatic rise in open source vulnerabilities, bringing to the fore interesting developments in open source security. The report drills down into the deeper layers of the open source phenomena and provides the latest insights on how organizations are handling vulnerabilities and what the future holds.

Brought to you by
WhiteSource

Which Cyber Security Framework is Right for Your Business?

This report outlines the seven most popular cyber security frameworks being used by businesses around the world.

Brought to you by
Integrity360

Best Ways to Extend Endpoint Management and Security to Mobile Devices

This paper examines the reasons for incorporating mobile device management (MDM) into endpoint management.

Brought to you by
Quest Software

Anti-Phishing Requires A Three-Pronged Strategy

This whitepaper explores how modern phishing techniques, are meticulously designed to defeat traditional email security approaches.

Brought to you by
Ironscales

Do You Need A Better Defense Strategy?

5 questions to ask before you upgrade to a SIEM solution

How Russian Twitter BOTs Weaponize Social Media to Influence and Disinform

This study originated with a simple question: What proportion of Twitter’s most influential users have followings comprised of a high number of bots, and how does that composition make these users more vulnerable?

Brought to you by
SafeGuard Cyber

Building a Threat Intelligence Program

ThreatConnect surveyed over 350 cyber security players in the United States to understand how their organization uses threat intelligence to aggregate and monitor cyber security data in one place.

Brought to you by
ThreatConnect

Reducing the Risk of Phishing Attacks

Aberdeen Group's quantitative analysis of the annualized likelihood and business impact of phishing attacks - for literally hundreds of scenarios, based on the selection of industry sector, number of users, and number of data records - helps senior business leaders to better appreciate the significant risk that phishing attacks represent.

Brought to you by
Cyren

Information and Cyber Challenges in the Public Sector

The public sector operates in an environment driven by data. From education and healthcare to utilities and housing, data is now as integral to the success of public services as the teams and physical infrastructures through which they are deployed.

Brought to you by
BSI Group

Make Threat Intelligence Smarter with Security Orchestration

Effective enterprise security has always required a blending of tools, and advances in the threat landscape are changing the careful balance that many have maintained. This paper digs into the opportunities and challenges that exist for infosec practitioner regarding threat intelligence.

Brought to you by
Infoblox

What’s Hot on Infosecurity Magazine?