Infosecurity White Papers

Best Practices for Applying Threat Intelligence

46% of security professionals expect threat intelligence to be a very important part of their strategy in 2017.

Brought to you by
Recorded Future

Detecting Ransomware Using File Server Auditing

Detecting Ransomware Using File Server Auditing

Hackers use ransomware to encrypt files on a victim's computer, and then demand money in exchange for the decryption key. Such attacks are becoming increasingly more frequent and sophisticated.

Brought to you by
Lepide Software

The GDPR & Open Source Security Management

The EU GDPR mandates that all companies processing and/or holding the personal data of EU residents must protect that information—regardless of where it is sent, processed or stored.

Brought to you by
Blackduck

Securing Real-Time Communications for Dummies

Securing Real-Time Communications for Dummies

Recent high-profile cyberattacks have many organizations understandably focusing their security efforts on preventing data breaches.

Brought to you by
Sonus

Ransomware - A New Approach to Identifying, Blocking and Real-Time Remediation

Ransomware attacks targeting companies have escalated 300% since January 2016; attacks are occurring every 40 seconds.

Brought to you by
CheckPoint, Dimension Data, NTT Security

Your Employees Won't Protect You

Your Employees Won't Protect You

Why businesses need an innovation injection to stay safe from cyber threats

Brought to you by
Glasswall Solutions

2017 Risk Value Report: Business Security- Always a Journey, Never a Destination

Download this new Risk:Value Report, commissioned by NTT Security, which highlights concerns and attitudes to security across global organisations; from compliance and cyber insurance to incident response planning.

Brought to you by
CheckPoint, Dimension Data, NTT Security

Encryption in Government: Make the Rules, Play by the Rules

Encryption in Government: Make the Rules, Play by the Rules

Few entities possess as much personal information as the U.S. government. In 2015, the Internal Revenue Service processed over 150 million tax returns, and the Social Security Administration paid benefits to nearly 60 million Americans.

Brought to you by
Apricorn

Avoiding Privilege Abuse in Active Directory

It’s inevitable. You’ve given a number of individuals in your organization rights to run around in AD making changes as they see fit, with little oversight. It’s a situation that’s ripe for abuse.

Brought to you by
Lepide Software

2017 Open Source Security & Risk Analysis Report

2017 Open Source Security & Risk Analysis Report

This analysis was done by Black Duck’s Center for Open Source Research and Innovation (COSRI) and examines findings from the anonymized data of more than 1,000 commercial applications audited in 2016.

Brought to you by
Blackduck

Prescriptive Guide to Security Reference Architecture

Learn how to develop an overall strategy for security and compliance, including selecting the best security framework for your environment.

Brought to you by
Tripwire

Security Configuration Management: Getting Back to IT Security Basics

Security Configuration Management: Getting Back to IT Security Basics

Cloud Computing. Virtualization. Social Networking. IT Consumerization. What do these trends all have in common?

Brought to you by
Tripwire

What’s Hot on Infosecurity Magazine?