Infosecurity White Papers

  1. The Evolving and Challenging Landscape of Identity Management

    In 2017, identity fraud hit an all-time high of 175,000 incidents according to the Cifas’ National Fraud Database and the number continues to rise.

  2. Is DNS your Security Achilles Heel?

    Explore how attackers take advantage of recursive DNS and learn best practices you can follow to mitigate the risks.

  3. CVE Publishing: A Race to Protect against Dark Web Threat Actors Trying to Exploit

    Although the practice of alerting the public with new CVEs (Critical Vulnerabilities and Exposures) is a crucial component in contemporary cyber-security strategy, Dark Web threat actors are actively searching for new vulnerabilities and investing considerable effort in finding ways to exploit them before organizations can protect themselves.

  4. The Complete Guide on Open Source Security

    The ins and outs of open source security in one comprehensive guide.

  5. The Untapped Potential of Malware Classification

    Choosing function and convenience over online privacy and security may come at a price.

  6. Corporate Data: the More You Have, the Greater the Risk

    What You Need to Know to Protect Corporate Data Throughout its Lifecycle

  7. CISO's Guide to Compliance

    Quickly Meet Regulatory Compliance and Improve Security with PAM.

  8. A Modern Identity for the Modern Consumer

    Learn how one trusted identity can transform the banking experience.

  9. A New Angle on Cybersecurity

    New threats demand new approaches. An expert point of view from BlackBerry Cybersecurity Consulting

  10. Threat Intel: Why More Doesn’t Mean Better Security

    Busting the myth that more threat intel feeds lead to better security.

  11. Five Must Ask DNS Questions

    Learn the five things to ask yourself as you consider a DNS security solution for your company.

  12. The Software Security Risk Manager

    Learn how to identify, communicate and manage security risks through the implementation of threat modeling.

  13. Top Tips for Digital Transformation in the Public Sector

    An evolving landscape means the Public Sector needs to be more security-ready than ever.

  14. The Top 5 Threats to Enterprise File Security

    Take a deeper look at the file security threats – both internal and external – facing modern businesses

  15. CEO Fraud Prevention Manual

    CEO fraud is responsible for over $3 billion in losses. Don’t be next.

  16. Securing Mobile Files: The Six Tools You Need

    Learn how to securely provide your users with the six tools they need to handle mobile files

  17. Securing Web Applications

    Web application security is much more than an IT problem. It can become a significant business problem if not handled properly.

  18. The 2018 Threat Impact and Endpoint Protection Report

    In 2017, Ransomware was a multi-billion dollar business, seeing the number of new ransomware variants continually grow quarter over quarter.

  19. Preparing for a Breach - Steps to Creating an Effective Incident Response Plan

    Steps to creating an effective incident response plan

What’s Hot on Infosecurity Magazine?