Infosecurity White Papers

Reducing the Risk of Phishing Attacks

Aberdeen Group's quantitative analysis of the annualized likelihood and business impact of phishing attacks - for literally hundreds of scenarios, based on the selection of industry sector, number of users, and number of data records - helps senior business leaders to better appreciate the significant risk that phishing attacks represent.

Brought to you by
Cyren

Information and Cyber Challenges in the Public Sector

The public sector operates in an environment driven by data. From education and healthcare to utilities and housing, data is now as integral to the success of public services as the teams and physical infrastructures through which they are deployed.

Brought to you by
BSI Group

Make Threat Intelligence Smarter with Security Orchestration

Effective enterprise security has always required a blending of tools, and advances in the threat landscape are changing the careful balance that many have maintained. This paper digs into the opportunities and challenges that exist for infosec practitioner regarding threat intelligence.

Brought to you by
Infoblox

What is GDPR and Why is it Important?

This document offers an overview of the GDPR and its effects, covering its background, key rules, penalties and recommended best practices.

Brought to you by
BlackBerry

451 Research Report: Securing Open Source - Why All The Attention, And Why Now?

Open source adoption has exploded, and with it come new risks. High-profile security incidents like HeartBleed, as well as the Equifax breach, have highlighted their impact.

Brought to you by
WhiteSource

The Executive’s Breach Response Preparedness Playbook

How C-level leaders contribute to a stronger security posture

Brought to you by
FireEye

UEM and IOT: The Sum is Greater Than its Parts

The Internet of Things (IoT) is a broad term referring to a huge variety of network enabled devices that take readings through an analog sensor, and transmit those readings over the network. In spite of the tremendous benefits that these devices provide, there are also disadvantages associated with their use.

Brought to you by
Quest Software

5 Steps to Starting Your Cloud Perimeter Journey

Businesses that pursue digital transformation will be rewarded, but not without facing challenges with their ever-expanding attack surface as well as their existing network and security architectures.

Brought to you by
Activereach Ltd, Akamai

The 2017 Equifax Breach: Retrospective Look & Lessons Learned

The Equifax breach that was announced in September 2017 is considered to be the biggest breach in history with hackers having stolen the personally identifiable information (PII) of nearly 147.9 million of the company’s customers,primarily located in the United States

Brought to you by
WhiteSource

Secure SSO to Office 365 and Other Cloud Applications with a Cloud-Based Authentication Solution

This white paper explores the widespread use of Office 365, what that means from a security perspective and how a cloud-based authentication solution can enable single sign on for Office 365 and a range of other business-critical services and applications.

Brought to you by
Entrust Datacard

Forrester Report: The State of Application Security- 2018

Application Security Is Worsening, But Automation Offers Hope

Brought to you by
WhiteSource

Privileged Access Management Key to Compliance with the NIS Directive

This white paper will shed light on the challenges and implications of the NIS Directive with regard to cybersecurity practices in European nations, and make a case for how a privileged access management solution easily helps them in their quest for compliance.

Brought to you by
Wallix Group

What’s Hot on Infosecurity Magazine?