Infosecurity White Papers

Download and engage with the latest White Papers focused on Information Security strategy, technology & insight. Each White Paper is editorially approved to ensure the research presented is up to date, high quality and relevant to personal development or workplace implementation.

 

Doing Healthcare Identity Governance Right

Doing Healthcare Identity Governance Right

Read this whitepaper to learn the key issues and trends within the healthcare industry that warrant the need for effective identity governance

Brought to you by
Core Security, A Helpsystems Co

Isolate, Remediate and Recover: Utilizing Deception-Based Alerts

Download this whitepaper to explore the three key questions that need answers when you suspect a breach

Brought to you by
Acalvio

The State of Email Security Report

The State of Email Security Report

This whitepaper investigates the most pervasive types of email threats, how security professionals perceive them and what they’re doing to combat them.

Brought to you by
Mimecast

Current State and Trends of Privileged Access Management

This whitepaper explores the challenges organizations face with privileged access management (PAM), the tools and methods used to manage privileged access and the effectiveness of PAM solutions.

Brought to you by
Remediant

Cloud Risk Surface Report

Cloud Risk Surface Report

How security findings differ among cloud providers

Brought to you by
Risk Recon

Mimecast Threat Intelligence Report: Black Hat Edition

The Mimecast Threat Intelligence Report: Black Hat Edition presents research conducted April-June 2019, reinforcing a previously observed trend: malware-centric campaigns

Brought to you by
Mimecast

Deception 2.0 for Dummies

Deception 2.0 for Dummies

Cybersecurity breaches are active on enterprise networks for an average of 200 days before they’re discovered. Once inside your network, attackers pivot to other systems and networks, stealing valuable and sensitive data with impunity.

Brought to you by
Acalvio

GDPR for Third Party Risk Management

This whitepaper details considerations organization need to account for when it comes to meeting Europe’s privacy regulations.

Brought to you by
Risk Recon

State of the Web Report 2019

State of the Web Report 2019

The State of the Web Report 2019 is designed to educate enterprises about the significant and under-recognized security challenges related to their web assets.

Brought to you by
Tala Security

Security by Design: How to Reduce the Attack Surface

Studies show one in 10 adults have been a victim of cybercrime. Download this whitepaper to find out more about becoming secure by design.

Brought to you by
Dimension Data

How to Create a Secure, More Efficient and Compliant Workplace

How to Create a Secure, More Efficient and Compliant Workplace

Increase safety with data-powered emergency response and crisis management

Brought to you by
HID Global

IT Director's Guide to Passwords and Cyber Essentials

This whitepaper explains the role of password policy and password security in achieving Cyber Essentials accreditation. Learn the five best practices for being Cyber Essentials certified

Brought to you by
Specops

What’s Hot on Infosecurity Magazine?