Infosecurity White Papers

Is Data Security in Financial Services Simply a Box-Ticking Exercise?

A four step guide to protecting your organization’s reputation and your customers’ data

Brought to you by
Egress Software Technologies Ltd

How to Build a Skilled IT Security Team in 5 Steps

How to Build a Skilled IT Security Team in 5 Steps

In an era of APT and sophisticated attacks, how do you make sure that your IT Security team and your organization have the right skills to protect your most critical assets? This paper focuses on the steps every organization should take to minimize cyber security risk for the coming years.

Brought to you by
eLearnSecurity

Preparing your Organization for the Inevitable HIPAA Audit

A four step guide to protecting your organization’s reputation and your customers’ data

Brought to you by
Egress Software Technologies Ltd

Educational Institutions at High Risk for Costly Data Breaches

Educational Institutions at High Risk for Costly Data Breaches

The Ponemon Institute estimates that on average, organizations of all types face a 26% probability of a data breach involving 10,000 or more lost or stolen records – and educational institutions are increasingly becoming targets.

Brought to you by
Apricorn

2017 Study on Mobile and IoT Application Security

Ponemon Institute is pleased to present the findings of the 2017 Study on Mobile and Internet of Things Application Security sponsored by IBM and Arxan Technologies.

Brought to you by
Arxan

The Right Prescription for Maintaining Compliance with Patient Security Regulations

The Right Prescription for Maintaining Compliance with Patient Security Regulations

In the healthcare industry, expensive equipment is usually a point of pride, but one leading provider never intended to pay $1.5 million each for two laptops.

Brought to you by
Apricorn

Insider Threats to Financial Services

Uncover evidence with external intelligence

Brought to you by
Recorded Future

Using Indicators To Deal With Security Attacks

Using Indicators To Deal With Security Attacks

Understand the unique capabilities of indicators of compromise and attack, the differences between them, and the steps to configure a SIEM solution to detect IoCs and IoAs.

Brought to you by
Manage Engine

Ransomware: What's the Cost to Business?

The steps organisations should take to mitigate the risk of ransomware attack

Brought to you by
NTT Security

Best Practices for Securing Privileged Access

Best Practices for Securing Privileged Access

Read this whitepaper to learn best practices for processes, policies and technology used to secure access to privileged accounts and other elevated privileges.

Brought to you by
Hitachi ID Systems

Encryption Mandate: Clear and Present Danger for the Energy Sector

Imagine what would happen if people no longer had access to safe, reliable electric power, water, telecommunications, gas supply, transportation, or other critical infrastructure systems.

Brought to you by
Apricorn

Machine Learning in Cyber Security: Age of the Centaurs

Machine Learning in Cyber Security: Age of the Centaurs

Artificial intelligence (AI), and in particular machine learning, has taken huge strides and is now set to really start impacting all aspects of industry and society.

Brought to you by
Recorded Future

What’s Hot on Infosecurity Magazine?