Infosecurity White Papers

Download and engage with the latest White Papers focused on Information Security strategy, technology & insight. Each White Paper is editorially approved to ensure the research presented is up to date, high quality and relevant to personal development or workplace implementation.


  1. Gcore Radar: DDoS Attack Trends Q3 to Q4, 2023

    As we enter 2024, we’re pleased to present the latest Gcore radar report, a twice-annual publication in which we release internal analytics to track DDoS attacks. Our broad, internationally distributed network of scrubbing centers allows us to follow attack trends over time. DDoS attack trends for the second half of 2023 reveal alarming developments in the scale and sophistication of cyberthreats. Notable changes to the DDoS landscape were the doubling of peak attack power into the mid-Tbps range, the targeting of specific industries with tailored strategies, and the globalization of attack resources.

  2. Healthcare Cloud Security Build vs. Buy

    Healthcare organizations face both challenges and opportunities as data management increasingly migrates to the cloud, and in-house IT teams must determine whether engaging with a healthcare cybersecurity vendor is the right choice for handling some or all their operations. In this white paper, we help you uncover strategies and best practices that can empower your organization to thrive in this era of technological transformation and heightened security concerns.

  3. A CISO's Guide to Post-Quantum Cryptography Migration

    Find out what decision-makers can do today to begin building a quantum-resilient organization

  4. Corporates Up Their Cyber Preparedness As Cyber Attacks Become More Widespread

    Given the extent of business disruption arising from some recent cyber events, the financial impact is becoming more meaningful

  5. 5 Ways to Strengthen Your Active Directory Password Policy

    A comprehensive guide to securing your first line of defense against cyber-attacks.

  6. Enhancing Information Security Resilience with the New ISO/IEC 27001 Standard

    The ISO/IEC 27001 international information security standard was updated in 2022, reflecting major changes to business practices

  7. Reduce downtime in ICS & OT from days and weeks to minutes

    This white paper presents an innovative solution for cyber- attacks on critical assets minimizing downtime and reducing the recovery process from days and weeks to minutes!

  8. Logpoint Emerging Threats Report: Russia v Ukraine. Round 2 Gamma Edition

    Discover how this cyber war has evolved since February 2022 and how Logpoint’s solutions and playbooks can help to prepare for, and respond to, an increase in Gamaredon malware.

  9. The New Standard in Cyber-Attack Recovery for ICS & OT

    In an increasingly interconnected world, critical infrastructures such as power grids, transportation networks, and water treatment facilities have become attractive targets for cybercriminals. Advanced Persistent Threats (APTs) have emerged as a significant threat, capable of causing extensive damage and disruption. Since cyber-attacks have become inevitable, mitigation is a must; This white paper presents an innovative solution for cyber- attacks on critical assets.

  10. Managed File Transfer for Enterprise: The Buyer’s Guide

    Info-Tech’s Data Quadrant Reports provide a comprehensive evaluation of popular products in the Managed File Transfer - Enterprise market. This buyer’s guide is designed to help prospective purchasers make better decisions by leveraging the experiences of real users.

  11. Three Ways to Spot Insider Risk

    The biggest challenge to spotting a threat is knowing what to look for.

  12. How to Choose a File Upload Security Solution for Web Applications

    Discover key strategies to fortify web applications against malicious file uploads with this comprehensive guide.

  13. Last Line of Defense Against Ransomware

    Ransomware is everywhere, and it’s not slowing down – read about what should strategically be in place to ensure that your data is full protected.

  14. The Difference Between Insider Risk and Insider Threat

    Threats and risks, they both sound dangerous, but they are not the same, and companies who manage risk effectively can minimize threats.

  15. Businesses Need Managed File Transfer

    Compared to using a variety of standalone FTP and SFTP tools, MFT technology allows professionals to streamline how data is transferred. This helps organizations do things like send and receive files in their cloud and private networks, create and control workflows, and automate transfers.

  16. Defending Data Against Ransomware

    Learn how to protect your data, even in worst-case scenarios, with this white paper that talks through benefits of software and hardware precautions to take. With increased occurrences in cyber-attacks and ransomware crime, it’s never been more important to ensure your critical data is protected.

  17. NIS2 - What is it and how it impacts cybersecurity

    NIS2 is an EU directive adopted by the EU parliament in November 2022. It aims to protect critical infrastructure within the EU from cyber threats and to achieve a high level of security across the EU.

  18. Secure Enterprise Network Traffic Against Modern Cyberthreats

    Learn how to effectively protect enterprise network traffic from file-based exploits and attacks with ICAP content inspection.

What’s hot on Infosecurity Magazine?