Infosecurity White Papers

  1. Make Threat Intelligence Smarter with Security Orchestration

    Effective enterprise security has always required a blending of tools, and advances in the threat landscape are changing the careful balance that many have maintained. This paper digs into the opportunities and challenges that exist for infosec practitioner regarding threat intelligence.

  2. What is GDPR and Why is it Important?

    This document offers an overview of the GDPR and its effects, covering its background, key rules, penalties and recommended best practices.

  3. 451 Research Report: Securing Open Source - Why All The Attention, And Why Now?

    Open source adoption has exploded, and with it come new risks. High-profile security incidents like HeartBleed, as well as the Equifax breach, have highlighted their impact.

  4. The Executive’s Breach Response Preparedness Playbook

    How C-level leaders contribute to a stronger security posture

  5. UEM and IOT: The Sum is Greater Than its Parts

    The Internet of Things (IoT) is a broad term referring to a huge variety of network enabled devices that take readings through an analog sensor, and transmit those readings over the network. In spite of the tremendous benefits that these devices provide, there are also disadvantages associated with their use.

  6. 5 Steps to Starting Your Cloud Perimeter Journey

    Businesses that pursue digital transformation will be rewarded, but not without facing challenges with their ever-expanding attack surface as well as their existing network and security architectures.

  7. The 2017 Equifax Breach: Retrospective Look & Lessons Learned

    The Equifax breach that was announced in September 2017 is considered to be the biggest breach in history with hackers having stolen the personally identifiable information (PII) of nearly 147.9 million of the company’s customers,primarily located in the United States

  8. How to Secure Cloud Apps & Reduce User Friction

    This white paper explores the widespread use of Office 365, what that means from a security perspective and how a cloud-based authentication solution can enable single sign on for Office 365 and a range of other business-critical services and applications.

  9. Forrester Report: The State of Application Security- 2018

    Application Security Is Worsening, But Automation Offers Hope

  10. Privileged Access Management Key to Compliance with the NIS Directive

    This white paper will shed light on the challenges and implications of the NIS Directive with regard to cybersecurity practices in European nations, and make a case for how a privileged access management solution easily helps them in their quest for compliance.

  11. Enforce a Zero Trust Security Model in Today’s Hostile Environment

    Companies of all types are pursuing digital transformation. The goal is to improve customer value,operate with greater efficiency and agility, and increase innovation. But as companies leverage new cloud and DevOps workflows to build their digital business, security has not kept pace.

  12. What Leads to Security Gaps in Financial Services

    This Research Brief focuses on unstructured data(such as Microsoft Office files, PDFs, and image files), and the security risks present in many of the internal business processes that use it.

  13. Ponemon Report: The Value of Threat Intelligence

    The Ponemon Institute surveyed 1,000+ US and UK security professionals on a range of threat intelligence topics. Results show that organizations are rapidly incorporating threat intelligence into their security programs. Learn key findings and more.

  14. Forrester Findings: Modern Authentication Methods that Protect and Enable

    Forrester recently surveyed 100 IT and security executives to understand their current approaches to user authentication and access management. Check out their report to learn what authentication methods other companies are using and which of these methods are most effective.

  15. Pen Test Metrics 2018

    What is your current confidence level in your application security program?

  16. The Evolving and Challenging Landscape of Identity Management

    In 2017, identity fraud hit an all-time high of 175,000 incidents according to the Cifas’ National Fraud Database and the number continues to rise.

  17. Is DNS your Security Achilles Heel?

    Explore how attackers take advantage of recursive DNS and learn best practices you can follow to mitigate the risks.

  18. CVE Publishing: A Race to Protect against Dark Web Threat Actors Trying to Exploit

    Although the practice of alerting the public with new CVEs (Critical Vulnerabilities and Exposures) is a crucial component in contemporary cyber-security strategy, Dark Web threat actors are actively searching for new vulnerabilities and investing considerable effort in finding ways to exploit them before organizations can protect themselves.

  19. The Complete Guide on Open Source Security

    The ins and outs of open source security in one comprehensive guide.

  20. The Untapped Potential of Malware Classification

    Choosing function and convenience over online privacy and security may come at a price.

What’s hot on Infosecurity Magazine?