Infosecurity White Papers

A Guide to DDoS Mitigation & Testing: Part 1 - An introduction to DDoS

This whitepaper provides an introduction to the threat of DDoS attacks and the current state of mitigation technologies.

Brought to you by
Activereach Ltd

Enterprise Defense at the Speed of Data

Enterprise Defense at the Speed of Data

Defending today’s global organizations is at the mercy of how quickly and efficiently you can turn data into intelligence and make informed decisions.

Brought to you by
ThreatConnect

5 Things to Consider when Defining Risk Appetite

Here are 5 things to consider to avoid risk.

Brought to you by
Panaseer

Payment Services Directive 2 (PSD2): What it is, what it means and how you can use it to your advantage

Payment Services Directive 2 (PSD2): What it is, what it means and how you can use it to your advantage

PSD2 (Payment Services Directive 2) can actually be a catalyst for your digital transformation and will provide a more secure, better user experience for your customers.

Brought to you by
Entrust Datacard

Black-box Security Assessment

The present document describes the activities performed and the results obtained during the Black-box Security Assessment conducted by CENSUS for an international financial institution.

Brought to you by
Census

Aligning to GDPR - The Date is Finally Upon Us, Now What Do We Do?

Aligning to GDPR - The Date is Finally Upon Us, Now What Do We Do?

How an organization can begin to align to GDPR from an unprepared posture with an immature privacy framework.

Brought to you by
BSI Group

How to Use Technology to Solve the Skills Shortage

Discover how effective data insight technology can help you reduce the amount of time your security teams spend on the low-value manual operations, and bring your focus back to the areas of most significant return.

Brought to you by
Panaseer

A Guide to DDoS Mitigation & Testing: Part 3 - Testing Distributed Denial of Service mitigation

A Guide to DDoS Mitigation & Testing: Part 3 - Testing Distributed Denial of Service mitigation

This technical paper addresses many of the issues associated with testing a company’s DDoS protection service.

Brought to you by
Activereach Ltd

2018 Fundamentals and Best Practices for Linux/UNIX Privileged Identity and Access Management: Guide

PIM, PAM and PUM have different meanings, and interpretations, to different people.

Brought to you by
Helpsystems

The Evolution of Enterprise Networking and Network Security

The Evolution of Enterprise Networking and Network Security

Networking and Security for a Bygone Era.

Brought to you by
Meta Networks

Inside the Mind of a Hacker - How Cybercriminals are Targeting your Business

Criminal hackers work like any other business, as part of commercial - albeit illegal - networks, with clear business models. We have come a long way from the lone hacker stereotype.

Brought to you by
Cloakware by Irdeto

Enough of the Noise: Let's Embrace GDPR

Enough of the Noise: Let's Embrace GDPR

Why is GDPR a change for good?

Brought to you by
Apricorn

What’s Hot on Infosecurity Magazine?