Infosecurity White Papers

Download and engage with the latest White Papers focused on Information Security strategy, technology & insight. Each White Paper is editorially approved to ensure the research presented is up to date, high quality and relevant to personal development or workplace implementation.

 

The Definitive Guide To Data 
Classification

The Definitive Guide To Data Classification

Read this guide to learn what classification is and why it is important, even foundational to data security

Brought to you by
HANDD Business Solutions

European Industrial Infrastructure Cyber Threat Perspective

European Industrial Infrastructure Cyber Threat Perspective

Read our whitepaper from Dragos to learn the reasons why they believe that the European Industrial Infrastructure is under threat from adversaries.

Brought to you by
Dragos

2022 Cofense Phishing Intelligence Trends Review - Q2

2022 Cofense Phishing Intelligence Trends Review - Q2

In Q2 of 2022, the phishing threat landscape was impacted by several factors. Read our whitepaper to learn more.

Brought to you by
Cofense

Digital Rights Management (DRM): Taking File Transfer Security to Another Level

Digital Rights Management (DRM): Taking File Transfer Security to Another Level

In this white paper, learn how your organization can benefit from the transparency and security built into digital rights management (DRM) and managed file transfer (MFT) tools.

Brought to you by
Helpsystems

Modernize Endpoint  Protection and Leave Your Legacy Challenges Behind

Modernize Endpoint Protection and Leave Your Legacy Challenges Behind

Download this eBook to gain insights into protecting your workforce at the endpoint no matter where you are.

Brought to you by
VMware

Pipedream Chernovite's emerging malware targeting Industrial Control Systems

Pipedream Chernovite's emerging malware targeting Industrial Control Systems

Read our complete analysis on CHERNOVITE and the PIPEDREAM malware and receive actionable guidance on what you can do to mitigate risk from cyber-attack.

Brought to you by
Dragos

What Is Data Classification And What Can It Do For My Business?

What Is Data Classification And What Can It Do For My Business?

This whitepaper considers what data classification is and what it can do for your business.

Brought to you by
HANDD Business Solutions

How to Build a Layered Defence to Combat Advanced Phishing Threats

How to Build a Layered Defence to Combat Advanced Phishing Threats

Traditional email security is NOT enough. Download this whitepaper to discover how to build a layered defence to combat advanced phishing threats.

Brought to you by
Cofense

Modern Bank Heists 5.0

Modern Bank Heists 5.0

Download the report to access a depiction of the evolving threat landscape which organizations must defend against collaboratively.

Brought to you by
VMware

An Intelligence Perspective on Insider Threats

An Intelligence Perspective on Insider Threats

An Intelligence Perspective on Insider Threat & the Unique Role It Plays in Industrial Control Systems (ICS) Environments.

Brought to you by
Dragos

5 Ways to Strengthen Your Active Directory Password Policy

5 Ways to Strengthen Your Active Directory Password Policy

A comprehensive guide to securing your first line of defense against cyber-attacks.

Brought to you by
Specops

6 Steps for Protecting Your Company

6 Steps for Protecting Your Company

Download this whitepaper to learn how to register and protect your domain

Brought to you by
ZeroFOX

What’s Hot on Infosecurity Magazine?