Infosecurity White Papers

How the Hybrid Cloud Changes the Game for Security

How the Hybrid Cloud Changes the Game for Security

Examining the dynamics of the hybrid cloud, and the challenges that organizations are facing as they adopt the latest technologies.

Brought to you by
Trend Micro

Responding to a Data Subject Access Request under the GDPR

This whitepaper discusses the challenges faced by organizations in complying with a Data Subject Access Request (DSAR) and the impact the General Data Protection Regulation (GDPR) will have in responding to such requests from 25th May 2018.

Brought to you by
BSI Group

New Approach to MSSP Security and Profitability

New Approach to MSSP Security and Profitability

Despite the vast amounts being spent on today’s state of the art cybersecurity solutions - data breaches are happening at an increasing rate with over 600 detected and reported in the U.S. alone by August 2016, and greater severity with over 20 million exposed records, a 20% increase over record-breaking years 2014 and 2015, according to the ITRC.

Brought to you by
Seceon

The Top 5 Myths of Next-Gen Endpoint Protection

It can be tough finding the time to pick through the marketing FUD to find the solution that will deliver the best protection. So let’s unpack five common myths associated with next-gen endpoint protection.

Brought to you by
Trend Micro

Transforming Security Operations with Automation and Analytics

Transforming Security Operations with Automation and Analytics

How do security professionals know that they are looking at the right thing?

Brought to you by
Fidelis Cybersecurity

8 Truths About the Threats - and Opportunities - of Employee Passwords

Learn why passwords are a problem that need to be solved, now.

Brought to you by
LogMeIn

Managing Enterprise Security and Compliance on SMB Budgets

Managing Enterprise Security and Compliance on SMB Budgets

An SMB focused perspective on information security compliance, discussing how to balance cost and complexity, the hidden areas that could increase staffing and/or budgetary cost and looks at the key considerations for an SMB focused solution.

Brought to you by
SureCloud

Managing Threats, Compliance and Fraud in an Era of Digital Transformation

New Infrastructure, New Risk Digital transformation is changing the way we work, collaborate and create. The arrival of new flexible platforms, infrastructure and digital channels mean new security, compliance and fraud risks.

Brought to you by
Proofpoint

Transforming Security Operations with Automated Detection & Response

Transforming Security Operations with Automated Detection & Response

Transforming Security Operations with Automated Detection & Response

Brought to you by
Fidelis Cybersecurity

Forged Email Protection

An analysis of email forgery techniques and protection methods available in Trend Micro SaaS email security products

Brought to you by
Trend Micro

Enhancing your Penetration Testing Regime

Enhancing your Penetration Testing Regime

This whitepaper explores how utilizing red-team or objective-oriented penetration testing services can provide increased insight into the security posture of an organization, its susceptibility to varying degrees of attack and its ability to detect and respond to such an attack.

Brought to you by
BSI Group

20 Steps to GDPR Compliance - A Methodical, Systematic and Logical Approach

20 steps to GDPR compliance – A methodical, systematic and logical approach: The General Data Protection Regulation (GDPR) is set to replace the Data Protection Directive 95/46/EC in May 2018.

Brought to you by
BSI Group

What’s Hot on Infosecurity Magazine?