Infosecurity White Papers

Download and engage with the latest White Papers focused on Information Security strategy, technology & insight. Each White Paper is editorially approved to ensure the research presented is up to date, high quality and relevant to personal development or workplace implementation.

 

Taking a Positive Approach to Developer Security

How to make secure code training and tools simple, relevant and engaging

Brought to you by
Secure Code Warrior

Tackling Insider Threat with Data Loss Protection

Tackling Insider Threat with Data Loss Protection

This report describes how to build an insider threat program.

Brought to you by
Code42

Responding to Security Questionnaires

Why vendor security questionnaires aren't going away, and what the impact will be on your team

Brought to you by
Whistic

Mastering Mainframe Maintenance

Mastering Mainframe Maintenance

Download this whitepaper to learn how mainframe computers can be handled efficiently.

Brought to you by
Comarch

Why Privileged Access Can Work at Scale and Better Defend You

This whitepaper explores why organizations need better privileged access management (PAM) and how they can master defense at scale.

Brought to you by
Remediant

How Deception Efforts can Bolster Your Security Posture

How Deception Efforts can Bolster Your Security Posture

This report covers and assessed CDS and the market positions of 18 vendors delivering products and services for CDS. The report includes relative vendor value and value spotlight charts, market size and forecast and segment futures for CDS.

Brought to you by
Acalvio

Why Multi Party Losses are Greater than Single Incidents

This whitepaper analyzes independent data gathered on over 800 multi-party cyber-incidents observed over the last decade.

Brought to you by
Risk Recon

How to Get Healthcare Identity Governance Right

How to Get Healthcare Identity Governance Right

Read this whitepaper to learn the key issues and trends within the healthcare industry that warrant the need for effective identity governance

Brought to you by
Core Security, A Helpsystems Co

Deceive to Achieve: The Key to Deception-Based Alerts

Download this whitepaper to explore the three key questions that need answers when you suspect a breach

Brought to you by
Acalvio

The State of Email Security Report

The State of Email Security Report

This whitepaper investigates the most pervasive types of email threats, how security professionals perceive them and what they’re doing to combat them.

Brought to you by
Mimecast

Know Your Role: Mastering Privileged Access Management

This whitepaper explores the challenges organizations face with privileged access management (PAM), the tools and methods used to manage privileged access and the effectiveness of PAM solutions.

Brought to you by
Remediant

Cloud Risk Surface Report

Cloud Risk Surface Report

How security findings differ among cloud providers

Brought to you by
Risk Recon

What’s Hot on Infosecurity Magazine?