Infosecurity White Papers

The Benefits of Managed Detection Services

This report provides an expert perspective on how UK businesses must consider risk and regulatory issues when shaping protection requirements

Brought to you by
eSentire

Agile Security Manifesto

Agile Security Manifesto

The Agile Manifesto was created in 2001 to provide an alternative to document-heavy software development practices.

Brought to you by
Synopsys

The Rising Role of IT in Physical Access Control

This whitepaper summarizes the details discovered in this research and provides actionable insights that will increase collaboration between IT and Physical Security.

Brought to you by
HID Global

Remedying the Email Security Gaps in Microsoft Office 365

Remedying the Email Security Gaps in Microsoft Office 365

Why should you consider additional security protection around Microsoft Office 365TM email use? Furthermore, what should you look for in a third-party solution?

Brought to you by
Mimecast

Mastering MFA: Combining Security with Usability, at a Lower Cost

Read this whitepaper to learn how MFA can strengthen your security posture while also lowering your costs and ensuring a better user experience.

Brought to you by
Ping Identity

Cloud Threat Report 2019

Cloud Threat Report 2019

This report summarizes 11 case studies of cloud-based attacks, including spear phishing, insider threat and zero-day malware.

Brought to you by
Darktrace

Beyond FTP: Securing & Managing File Transfers

This paper examines how FTP became the standard for business-to-business file transfers. It identifies the key pitfalls that face management using this open protocol.

Brought to you by
Helpsystems

Common Use Cases for Attack Surface Manager

Common Use Cases for Attack Surface Manager

This whitepaper provides an overview of common ways that Illusive’s customers are using Attack Surface Manager, including fortifying PAM/PIM solutions, detecting insider threats and malicious insider activity and providing powerful, automated Red Team functions.

Brought to you by
Illusive Networks

Data Breach Survey 2019

Data Breach Survey 2019

The results of the research can offer insights that could help to inform the allocation of security budgets and strategies so that investment can be directed to where it will achieve the greatest impact in preventing costly data breaches.

Brought to you by
Egress

The Vulnerable Landscape: Metrics, Insights and Impact for Security Leaders

You’re racing the clock to patch the riskiest vulnerabilities before attackers exploit them

Brought to you by
eSentire

State of Cybersecurity Report 2019

State of Cybersecurity Report 2019

An exclusive report by Infosecurity Magazine. Discover the trends that are driving the information security industry forward in 2019.

Brought to you by
Infosecurity Europe, Infosecurity Magazine

Why Outdated Access Control Systems Are a Big Problem

Physical access control doesn’t have to be the weak link in your security program. IDG and HID Global® have partnered to deliver a practical guide capturing best practices for implementing new, more dynamic access control technologies.

Brought to you by
HID Global

What’s Hot on Infosecurity Magazine?