Infosecurity White Papers

Download and engage with the latest White Papers focused on Information Security strategy, technology & insight. Each White Paper is editorially approved to ensure the research presented is up to date, high quality and relevant to personal development or workplace implementation.

 

Educational Institutions at High Risk for Costly Data Breaches

The Ponemon Institute estimates that on average, organizations of all types face a 26% probability of a data breach involving 10,000 or more lost or stolen records – and educational institutions are increasingly becoming targets.

Brought to you by
Apricorn

2017 Study on Mobile and IoT Application Security

Ponemon Institute is pleased to present the findings of the 2017 Study on Mobile and Internet of Things Application Security sponsored by IBM and Arxan Technologies.

Brought to you by
Arxan

The Right Prescription for Maintaining Compliance with Patient Security Regulations

The Right Prescription for Maintaining Compliance with Patient Security Regulations

In the healthcare industry, expensive equipment is usually a point of pride, but one leading provider never intended to pay $1.5 million each for two laptops.

Brought to you by
Apricorn

Insider Threats to Financial Services

Uncover evidence with external intelligence

Brought to you by
Recorded Future

Using Indicators To Deal With Security Attacks

Using Indicators To Deal With Security Attacks

Understand the unique capabilities of indicators of compromise and attack, the differences between them, and the steps to configure a SIEM solution to detect IoCs and IoAs.

Brought to you by
Manage Engine

Ransomware: What's the Cost to Business?

The steps organisations should take to mitigate the risk of ransomware attack

Brought to you by
NTT Security

Best Practices for Securing Privileged Access

Best Practices for Securing Privileged Access

Read this whitepaper to learn best practices for processes, policies and technology used to secure access to privileged accounts and other elevated privileges.

Brought to you by
Hitachi ID Systems

Encryption Mandate: Clear and Present Danger for the Energy Sector

Imagine what would happen if people no longer had access to safe, reliable electric power, water, telecommunications, gas supply, transportation, or other critical infrastructure systems.

Brought to you by
Apricorn

Machine Learning in Cyber Security: Age of the Centaurs

Machine Learning in Cyber Security: Age of the Centaurs

Artificial intelligence (AI), and in particular machine learning, has taken huge strides and is now set to really start impacting all aspects of industry and society.

Brought to you by
Recorded Future

Why IT Teams Migrate to Managed File Transfer

The Growing Challenge: Moving Files to Support Critical Business

Brought to you by
Ipswitch

Regulatory Compliance Is Always a Smart Investment

Regulatory Compliance Is Always a Smart Investment

Is it possible to go overboard and encrypt more than necessary? Certainly.

Brought to you by
Apricorn

Successful File Server Auditing: Looking Beyond Native Auditing

File system auditing is no longer simply about the passive auditing of past events.

Brought to you by
Lepide Software

What’s Hot on Infosecurity Magazine?