Infosecurity White Papers

Download and engage with the latest White Papers focused on Information Security strategy, technology & insight. Each White Paper is editorially approved to ensure the research presented is up to date, high quality and relevant to personal development or workplace implementation.

 

Secure Email Messaging in Office 365: Four Key Considerations

Download this whitepaper to learn the four issues that are highly important when considering email security functionality in O365.

Brought to you by
Egress Software Technologies Ltd

Detection of Denial of Service Attacks in Modern Cloud Environments

Detection of Denial of Service Attacks in Modern Cloud Environments

Due to local data processing laws and security policies, companies are often unable to use public cloud resources.

Brought to you by
Comarch

Leveled-Up Value Recognition for Shared Security Services

What Challenges Do Managed Security Service Providers Face?

Brought to you by
FourV

Evolving Threats Call For Integrated Endpoint Security Solutions With Holistic Visibility

Evolving Threats Call For Integrated Endpoint Security Solutions With Holistic Visibility

High-profile, targeted attacks from malicious actors now occur with frightening and increasing regularity.

Brought to you by
Trend Micro

Is Data Security in Financial Services Simply a Box-Ticking Exercise?

A four step guide to protecting your organization’s reputation and your customers’ data

Brought to you by
Egress Software Technologies Ltd

How to Build a Skilled IT Security Team in 5 Steps

How to Build a Skilled IT Security Team in 5 Steps

In an era of APT and sophisticated attacks, how do you make sure that your IT Security team and your organization have the right skills to protect your most critical assets? This paper focuses on the steps every organization should take to minimize cyber security risk for the coming years.

Brought to you by
eLearnSecurity

Preparing your Organization for the Inevitable HIPAA Audit

A four step guide to protecting your organization’s reputation and your customers’ data

Brought to you by
Egress Software Technologies Ltd

Educational Institutions at High Risk for Costly Data Breaches

Educational Institutions at High Risk for Costly Data Breaches

The Ponemon Institute estimates that on average, organizations of all types face a 26% probability of a data breach involving 10,000 or more lost or stolen records – and educational institutions are increasingly becoming targets.

Brought to you by
Apricorn

2017 Study on Mobile and IoT Application Security

Ponemon Institute is pleased to present the findings of the 2017 Study on Mobile and Internet of Things Application Security sponsored by IBM and Arxan Technologies.

Brought to you by
Arxan

The Right Prescription for Maintaining Compliance with Patient Security Regulations

The Right Prescription for Maintaining Compliance with Patient Security Regulations

In the healthcare industry, expensive equipment is usually a point of pride, but one leading provider never intended to pay $1.5 million each for two laptops.

Brought to you by
Apricorn

Insider Threats to Financial Services

Uncover evidence with external intelligence

Brought to you by
Recorded Future

Using Indicators To Deal With Security Attacks

Using Indicators To Deal With Security Attacks

Understand the unique capabilities of indicators of compromise and attack, the differences between them, and the steps to configure a SIEM solution to detect IoCs and IoAs.

Brought to you by
Manage Engine

What’s Hot on Infosecurity Magazine?