Infosecurity White Papers

Download and engage with the latest White Papers focused on Information Security strategy, technology & insight. Each White Paper is editorially approved to ensure the research presented is up to date, high quality and relevant to personal development or workplace implementation.

 

How to Build a Layered Defence to Combat Advanced Phishing Threats

How to Build a Layered Defence to Combat Advanced Phishing Threats

Traditional email security is NOT enough. Download this whitepaper to discover how to build a layered defence to combat advanced phishing threats.

Brought to you by
Cofense

Modern Bank Heists 5.0

Modern Bank Heists 5.0

Download the report to access a depiction of the evolving threat landscape which organizations must defend against collaboratively.

Brought to you by
VMware

An Intelligence Perspective on Insider Threats

An Intelligence Perspective on Insider Threats

An Intelligence Perspective on Insider Threat & the Unique Role It Plays in Industrial Control Systems (ICS) Environments.

Brought to you by
Dragos

5 Ways to Strengthen Your Active Directory Password Policy

5 Ways to Strengthen Your Active Directory Password Policy

A comprehensive guide to securing your first line of defense against cyber-attacks.

Brought to you by
Specops

6 Steps for Protecting Your Company

6 Steps for Protecting Your Company

Download this whitepaper to learn how to register and protect your domain

Brought to you by
ZeroFOX

BEC: Tactics and Trends of the Most Costly Email Threat

BEC: Tactics and Trends of the Most Costly Email Threat

Read this whitepaper to learn what to do when engaged with real threat actors, how to potentially recover assets, ways to mitigate threats and more.

Brought to you by
Cofense

7 Ways Policy-Driven Automation
Helps With The Security Skills Shortage

7 Ways Policy-Driven Automation Helps With The Security Skills Shortage

Learn why policy-centric automation is the antidote to the worsening cybersecurity skills shortage

Brought to you by
Tufin

Steps to Get Ahead of Insider Threats

Steps to Get Ahead of Insider Threats

This report provides a deeper dive into today’s top risks and provides a roadmap for minimizing risk through better intelligence, process and technology.

Brought to you by
Veriato

Polymorphic Phishing Attacks: 5 Insights to Help Stop Them

Polymorphic Phishing Attacks: 5 Insights to Help Stop Them

Threat actors are evolving quickly and modern day attacks are more complex and sophisticated. Learn why intelligence and human reporting + AI are a MUST.

Brought to you by
Cofense

Data Classification - Why Organizations 
Need a Specialist Security Provider

Data Classification - Why Organizations Need a Specialist Security Provider

In this whitepaper, we look at how the security landscape has changed in the last couple of years.

Brought to you by
HANDD Business Solutions

Financial Sector Quarterly Threat Landscape

Financial Sector Quarterly Threat Landscape

The threat landscape evolves at a drastic pace. ZeroFox latest industry review provides situational awareness and a broad view of the public attack surface.

Brought to you by
ZeroFOX

Azure AD Password Protection competitor comparison

Azure AD Password Protection competitor comparison

The name Azure AD Password Protection indicates that users are protected from using bad passwords, but within this whitepaper, you’ll discover that’s not the case.

Brought to you by
Specops

What’s Hot on Infosecurity Magazine?