Infosecurity White Papers

Download and engage with the latest White Papers focused on Information Security strategy, technology & insight. Each White Paper is editorially approved to ensure the research presented is up to date, high quality and relevant to personal development or workplace implementation.

 

Email Impersonation Is Rampant - One in Five Messages Cannot Be Trusted

Without email authentication, fraudsters can easily impersonate any domain simply by putting it into the From field of their messages.

Brought to you by
ValiMail

Patient-Centric Data Protection

Real World Scenarios of Stopping PHI Theft with DLP

Brought to you by
Digital Guardian

Building a Threat Intelligence Program

Turn tactical use cases into a strategic TI capability.

Brought to you by
Anomali

Social Media Protection for Dummies

Social Media Protection for Dummies

Learn how to build an effective social media protection program.

Brought to you by
Zerofox

Navigating the Evolving Threat Landscape with a More Complete Approach to Network Security

How targeted attacks are changing the network security landscape.

Brought to you by
Trend Micro

Securing the Server Compute Evolution: Hybrid Cloud Has Transformed the Datacenter

Securing the Server Compute Evolution: Hybrid Cloud Has Transformed the Datacenter

This Technology Spotlight highlights how hybrid cloud architectures, underpinned by the growth of cloud computing and virtualization, has transformed the way organizations should view server security.

Brought to you by
Trend Micro

Strengthening the Security Foundation of Cryptography

An overview of cryptographic randomness requirements for the data center/cloud, the limitations of previous methods, and Whitewood’s solution.

Brought to you by
Whitewood Security

The Definitive Guide to Sharing Threat Intelligence

The Definitive Guide to Sharing Threat Intelligence

Download this whitepaper to learn the main points for consideration in regards to sharing threat intelligence.

Brought to you by
Anomali

A New Approach to Sensitive Data

Download this whitepaper to understand the provisions introduced by the regulation concerning "sensitive data" and what are the rights of the Controller vs the Personal Data Stakeholder.

Brought to you by
Comarch

Managed Detection & Response

Managed Detection & Response

Why a cost-effective MDR service can significantly enhance your ability to rapidly respond to threats and breaches

Brought to you by
Redscan

The Value of Threat Intelligence

The Value of Threat Intelligence

The Second Annual Study of North American & United Kingdom Companies

Brought to you by
Anomali

A Best Practice Guide to Mitigating Ransomware in Your Enterprise

Learn 4 simple best practices that you can implement to prevent ransomware attacks in your enterprise.

Brought to you by
Manage Engine

What’s Hot on Infosecurity Magazine?