Infosecurity White Papers

Download and engage with the latest White Papers focused on Information Security strategy, technology & insight. Each White Paper is editorially approved to ensure the research presented is up to date, high quality and relevant to personal development or workplace implementation.

 

IT Director's Guide to Passwords and Cyber Essentials

This whitepaper explains the role of password policy and password security in achieving Cyber Essentials accreditation. Learn the five best practices for being Cyber Essentials certified

Brought to you by
Specops

2019 Cloud Security Report

2019 Cloud Security Report

The 2019 Cloud Security Report highlights what is and what is not working for security operations teams in securing their cloud data, systems and services in this shared responsibility model.

Brought to you by
Synopsys

Who is GOSSIPGIRL: Revisiting the Threat Actor Supergroup

This whitepaper investigates the connection between Flame and the O.G. threat actor super group GOSSIPGIRL.

Brought to you by
Chronicle Security

Say 'Yes' to Bring-Your-Own-Apps

Say 'Yes' to Bring-Your-Own-Apps

Read this whitepaper to learn how to manage BYOA securely and effectively

Brought to you by
Dimension Data

Doing Identity Access Right

This guide will help you learn how Identity Governance and Administration (IGA) can Combat risks

Brought to you by
Helpsystems

Mobile Access - What You Need to Know

Mobile Access - What You Need to Know

What to consider when adding mobile devices in your access control infrastructure?

Brought to you by
HID Global

Five Enterprise Attack Vectors You Can Protect with MFA

5 most common ways in which hackers can obtain credentials or gain unauthorized access.

Brought to you by
Ping Identity

Know Your Enemy. Know Your Risk

Know Your Enemy. Know Your Risk

This report gets inside the mind of a hacker, analyzing their motivations and methods for penetrating cyber-defenses, and outlines the most effective ways to reduce your risk.

Brought to you by
eSentire

Harness the Benefits of Unified Physical & Logical Control Access

Harness the Benefits of Unified Physical & Logical Control Access

As high-profile data breaches grab headlines across the globe, many organizations are shifting their attention to external cyber-threats. While these external threats are very real, confronting internal vulnerabilities is one of the most effective ways of preventing attacks in the first place. Converging physical and logical access is one way to reduce risk.

Brought to you by
HID Global

7 Common Identity and Access Management Fears

This eBook addresses seven of the most common IAM fears and how you can overcome them.

Brought to you by
Helpsystems

Managing the Risk of Post-Breach or "Resident" Attacks: A Ponemon Institute Study

Managing the Risk of Post-Breach or "Resident" Attacks: A Ponemon Institute Study

Download the report to learn the primary obstacles to better threat detection and incident response.

Brought to you by
Illusive Networks

What’s Hot on Infosecurity Magazine?