Infosecurity White Papers

Internet Security Report - Q4 2019

Internet Security Report - Q4 2019

This report prepares businesses, service providers and end users with the data, trends, research and best practices they need to defend against today’s security threats.

Brought to you by
WatchGuard Technologies

Definitive Guide to Internet Isolation

Read this whitepaper to learn how internet isolation can revolutionize security to eliminate the risk of phishing attacks and malware-infected endpoints for secure cloud transformation.

Brought to you by
Menlo Security

Zero Trust Security Internet is the Answer

Zero Trust Security Internet is the Answer

In this whitepaper, learn the benefits of implementing a zero trust internet approach to your email and web security

Brought to you by
Menlo Security

Third-Party Cyber Risk: 8 Key Considerations

This Whitepaper looks at why third-party security risk matters, some of the forces transforming this space, and how to prioritise risk.

Brought to you by
RiskRecon

A Guide to Mastering Managed File Transfer

A Guide to Mastering Managed File Transfer

Read this whitepaper now to learn the steps you should take to select the right file transfer solution to meet your organizational needs.

Brought to you by
Progress

Third-Party Risk Management Playbook

What impact a Ripple Event could have on your organization.

Brought to you by
RiskRecon

Risk-Based Vulnerability Management: Focus on the Vulnerabilities That Pose the Greatest Risk

Risk-Based Vulnerability Management: Focus on the Vulnerabilities That Pose the Greatest Risk

Find out why CVSS fails as a prioritization tool – and why it’s imperative to consider business context, including vulnerability data, threat intelligence and asset criticality

Brought to you by
Tenable

Coders Conquer Security: Your Battle Plan to Defeat the OWASP Top 10

This whitepaper is your ultimate, fully-interactive guide to understanding each infamous entry in the OWASP Top 10, gaining insight into how each bug operates.

Brought to you by
Secure Code Warrior

Employees Quit. Data Leaves.

Employees Quit. Data Leaves.

This report presents a life-like scenario depicting how and why a departing member of staff can prove to be a significant security threat

Brought to you by
Code42

Taking a Positive Approach to Developer Security

How to make secure code training and tools simple, relevant and engaging

Brought to you by
Secure Code Warrior

Tackling Insider Threat with Data Loss Protection

Tackling Insider Threat with Data Loss Protection

This report describes how to build an insider threat program.

Brought to you by
Code42

Responding to Security Questionnaires

Why vendor security questionnaires aren't going away, and what the impact will be on your team

Brought to you by
Whistic

What’s Hot on Infosecurity Magazine?